top of page
perceptive_background_267k.jpg

xmlseclibs is a library written in PHP for working with XML Encryption and Signatures. Prior to 3.1.5, XML nodes encrypted with either aes-128-gcm, aes-192-gcm,…

Published:

15 maart 2026 om 23:00:00

Alert date:

16 maart 2026 om 16:21:26

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

xmlseclibs PHP library for XML Encryption and Signatures contains a critical vulnerability in versions prior to 3.1.5. The vulnerability affects XML nodes encrypted with AES-GCM algorithms (aes-128-gcm, aes-192-gcm, aes-256-gcm) due to lack of authentication tag length validation. Attackers can exploit this to brute-force authentication tags, recover GHASH keys, decrypt encrypted nodes, and forge arbitrary ciphertexts without knowing the encryption key. The vulnerability has been patched in version 3.1.5.

Technical details

Mitigation steps:

Affected products:

xmlseclibs

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page