Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. signxml
  4. ›
  5. CVE-2025-48994

CVE-2025-48994: SignXML's signature verification with HMAC is vulnerable to an algorithm confusion attack

June 5, 2025 (updated November 10, 2025)

When verifying signatures with X509 certificate validation turned off and HMAC shared secret set (signxml.XMLVerifier.verify(require_x509=False, hmac_key=...), prior versions of SignXML are vulnerable to a potential algorithm confusion attack. Unless the user explicitly limits the expected signature algorithms using the signxml.XMLVerifier.verify(expect_config=...) setting, an attacker may supply a signature unexpectedly signed with a key other than the provided HMAC key, using a different (asymmetric key) signature algorithm.

Starting with signxml 4.0.4, specifying hmac_key causes the set of accepted signature algorithms to be restricted to HMAC only, if not already restricted by the user.

References

  • github.com/XML-Security/signxml
  • github.com/XML-Security/signxml/commit/e3c0c2b82a3329a65d917830657649c98b8c7600
  • github.com/XML-Security/signxml/security/advisories/GHSA-6vx8-pcwv-xhf4
  • github.com/advisories/GHSA-6vx8-pcwv-xhf4
  • nvd.nist.gov/vuln/detail/CVE-2025-48994

Code Behaviors & Features

Detect and mitigate CVE-2025-48994 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.0.4

Fixed versions

  • 4.0.4

Solution

Upgrade to version 4.0.4 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-303: Incorrect Implementation of Authentication Algorithm

Source file

pypi/signxml/CVE-2025-48994.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 11 Dec 2025 00:18:06 +0000.