Home

Description

Mojic is a CLI tool to transform readable C code into an unrecognizable chaotic stream of emojis. Prior to 2.1.4, the CipherEngine uses a standard equality operator (!==) to verify the HMAC-SHA256 integrity seal during the decryption phase. This creates an Observable Timing Discrepancy (CWE-208), allowing a potential attacker to bypass the file integrity check via a timing attack. This vulnerability is fixed in 2.1.4.

PUBLISHED Reserved 2026-04-18 | Published 2026-04-24 | Updated 2026-04-24 | Assigner GitHub_M




MEDIUM: 4.7CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

Problem types

CWE-208: Observable Timing Discrepancy

Product status

< 2.1.4
affected

References

github.com/.../mojic/security/advisories/GHSA-wqq3-wfmp-v85g exploit

github.com/.../mojic/security/advisories/GHSA-wqq3-wfmp-v85g

cve.org (CVE-2026-41244)

nvd.nist.gov (CVE-2026-41244)

Download JSON