top of page
perceptive_background_267k.jpg

goxmlsig provides XML Digital Signatures implemented in Go. Prior to version 1.6.0, the `validateSignature` function in `validate.go` goes through the reference…

Published:

25 maart 2026 om 23:00:00

Alert date:

26 maart 2026 om 19:02:42

Source:

nvd.nist.gov

Click to open the original link from this advisory

Supply Chain & Dependencies, Web Technologies

goxmlsig library for XML Digital Signatures in Go contains a critical loop variable capture issue in versions prior to 1.6.0. The validateSignature function in validate.go incorrectly takes the address of loop variable _ref instead of its value when processing SignedInfo references. This occurs in Go versions before 1.22 or when using older go.mod versions. The vulnerability causes the ref pointer to always point to the last element in SignedInfo.References slice, potentially compromising XML signature validation. A patch is available in goxmlsig version 1.6.0.

Technical details

Mitigation steps:

Affected products:

goxmlsig

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page