CVE-2025-40934
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-26

Last updated on: 2025-12-30

Assigner: CPANSec

Description
XML-Sig versions 0.27 through 0.67 for Perl incorrectly validates XML files if signatures are omitted. An attacker can remove the signature from the XML document to make it pass the verification check. XML-Sig is a Perl module to validate signatures on XML files.Β  An unsigned XML file should return an error message.Β  The affected versions return true when attempting to validate an XML file that contains no signatures.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-26
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-11-27
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
xml\ \ sig_project
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-347 The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in XML-Sig Perl module versions 0.27 through 0.67, where the module incorrectly validates XML files if the signatures are omitted. Specifically, an attacker can remove the signature from an XML document, and the module will still incorrectly indicate that the signature verification passed, even though the XML file is unsigned.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to bypass signature verification on XML files, potentially leading to acceptance of unsigned or tampered XML data as valid. This could result in unauthorized data manipulation, security breaches, or trust violations in systems relying on XML signature validation for integrity and authenticity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart