{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T01:58:15.977","vulnerabilities":[{"cve":{"id":"CVE-2026-32600","sourceIdentifier":"security-advisories@github.com","published":"2026-03-16T14:19:38.953","lastModified":"2026-03-17T19:25:09.150","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"xml-security is a library that implements XML signatures and encryption. Prior to versions 2.3.1 and 1.13.9, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use this to brute-force an authentication tag, recover the GHASH key, and decrypt the encrypted nodes. It also allows to forge arbitrary ciphertexts without knowing the encryption key. This vulnerability is fixed in 2.3.1 and 1.13.9."},{"lang":"es","value":"xml-security es una biblioteca que implementa firmas XML y cifrado. Antes de las versiones 2.3.1 y 1.13.9, los nodos XML cifrados con aes-128-gcm, aes-192-gcm o aes-256-gcm carecen de validación de la longitud de la etiqueta de autenticación. Un atacante puede usar esto para forzar por fuerza bruta una etiqueta de autenticación, recuperar la clave GHASH y descifrar los nodos cifrados. También permite falsificar textos cifrados arbitrarios sin conocer la clave de cifrado. Esta vulnerabilidad está corregida en 2.3.1 y 1.13.9."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-354"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:simplesamlphp:xml-security:*:*:*:*:*:*:*:*","versionEndExcluding":"1.13.9","matchCriteriaId":"3D4DF512-B74E-412C-804F-6ED06CC1B9F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:simplesamlphp:xml-security:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.3.1","matchCriteriaId":"78834E45-06AC-48A5-9535-C6A34F4FEF96"}]}]}],"references":[{"url":"https://github.com/simplesamlphp/xml-security/commit/cad6d57cf0a5a0b7e0cc4e4a5b18752e56eb1520","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/simplesamlphp/xml-security/commit/fdc12449e959c610943f9fd428e95e3832d74c25","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/simplesamlphp/xml-security/security/advisories/GHSA-r353-4845-pr5p","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}