Home

Description

hpke-js is a Hybrid Public Key Encryption (HPKE) module built on top of Web Cryptography API. Prior to version 1.7.5, the public SenderContext Seal() API has a race condition which allows for the same AEAD nonce to be re-used for multiple Seal() calls. This can lead to complete loss of Confidentiality and Integrity of the produced messages. This issue has been patched in version 1.7.5.

PUBLISHED Reserved 2025-11-10 | Published 2025-11-21 | Updated 2025-11-21 | Assigner GitHub_M




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-323: Reusing a Nonce, Key Pair in Encryption

Product status

< 1.7.5
affected

References

github.com/...pke-js/security/advisories/GHSA-73g8-5h73-26h4

github.com/...ommit/94a767c9b9f37ce48d5cd86f7017d8cacd294aaf

github.com/...7f891af75c4/packages/core/src/senderContext.ts

cve.org (CVE-2025-64767)

nvd.nist.gov (CVE-2025-64767)

Download JSON