Multiple vulnerabilities have been discovered in the jsrsasign library, potentially leading to private key recovery, signature forgery, and denial-of-service (DoS) attacks. These issues affect applications using jsrsasign versions prior to 11.1.1. A patch is now available to address these vulnerabilities.
These vulnerabilities range from medium to critical, potentially allowing for complete system compromise.
What is Jsrsasign?
CVE-2026-4599: DSA Private Key Recovery via Biased Nonce Generation
Critical severity due to potential for private key recovery.
EPSS score of 0.037 indicates a low probability of exploitation.
An incomplete comparison in `getRandomBigIntegerZeroToMax` and `getRandomBigIntegerMinToMax` functions can lead to biased DSA nonce generation. An attacker can exploit this to recover the private key by analyzing the biased nonces used during signature generation.
How to fix CVE-2026-4599 in jsrsasign
Patch immediately- 1.Update the jsrsasign package to version 11.1.1 or later.
npm update jsrsasignWorkaround: There is no workaround; patching is the only solution.
NextGuard automatically flags CVE-2026-4599 if jsrsasign appears in any of your monitored projects — no manual lookup required.
CVE-2026-4600: DSA Signature Forgery via Domain-Parameter Validation
High severity due to potential for signature forgery.
EPSS score of 0.01 indicates a very low probability of exploitation.
Improper verification of cryptographic signatures in `KJUR.crypto.DSA.setPublic` allows for DSA signature forgery. An attacker can forge signatures or X.509 certificates by supplying malicious domain parameters.
How to fix CVE-2026-4600 in jsrsasign
Patch immediately- 1.Update the jsrsasign package to version 11.1.1 or later.
npm update jsrsasignWorkaround: There is no workaround; patching is the only solution.
NextGuard automatically flags CVE-2026-4600 if jsrsasign appears in any of your monitored projects — no manual lookup required.
CVE-2026-4602: Signature Verification Bypass via Negative Exponent Handling
High severity due to potential for signature verification bypass.
EPSS score of 0.051 indicates a low probability of exploitation.
Incorrect conversion between numeric types when handling negative exponents can lead to signature verification bypass. An attacker can force the computation of incorrect modular inverses and break signature verification by calling `modPow` with a negative exponent.
How to fix CVE-2026-4602 in jsrsasign
Patch immediately- 1.Update the jsrsasign package to version 11.1.1 or later.
npm update jsrsasignWorkaround: There is no workaround; patching is the only solution.
NextGuard automatically flags CVE-2026-4602 if jsrsasign appears in any of your monitored projects — no manual lookup required.
CVE-2026-4601: Private Key Extraction via Missing Cryptographic Validation
High severity due to potential for private key extraction.
EPSS score of 0.015 indicates a very low probability of exploitation.
Missing cryptographic validation during DSA signing enables private key extraction. An attacker can recover the private key by forcing `r` or `s` to be zero, causing the library to emit an invalid signature without retrying, and then solving for `x` from the resulting signature.
How to fix CVE-2026-4601 in jsrsasign
Patch immediately- 1.Update the jsrsasign package to version 11.1.1 or later.
npm update jsrsasignWorkaround: There is no workaround; patching is the only solution.
NextGuard automatically flags CVE-2026-4601 if jsrsasign appears in any of your monitored projects — no manual lookup required.
CVE-2026-4603: Deterministic Zero Output in RSA Operations via Division by Zero
Medium severity due to potential for RSA operation manipulation.
EPSS score of 0.009 indicates a very low probability of exploitation.
Division by zero allows an invalid JWK modulus to cause deterministic zero output in RSA operations. An attacker can force RSA public-key operations to collapse to deterministic zero outputs and hide “invalid key” errors by supplying a JWK whose modulus decodes to zero.
How to fix CVE-2026-4603 in jsrsasign
Patch within 7 days- 1.Update the jsrsasign package to version 11.1.1 or later.
npm update jsrsasignWorkaround: There is no workaround; patching is the only solution.
NextGuard automatically flags CVE-2026-4603 if jsrsasign appears in any of your monitored projects — no manual lookup required.
CVE-2026-4598: Denial of Service via Infinite Loop
High severity due to potential for denial of service.
EPSS score of 0.051 indicates a low probability of exploitation.
The `bnModInverse` function is vulnerable to an infinite loop when processing zero or negative inputs. An attacker can hang the process permanently by supplying such crafted values, leading to a denial-of-service condition.
How to fix CVE-2026-4598 in jsrsasign
Patch immediately- 1.Update the jsrsasign package to version 11.1.1 or later.
npm update jsrsasignWorkaround: Ensure that inputs to `bnModInverse` are validated to be positive and non-zero.
NextGuard automatically flags CVE-2026-4598 if jsrsasign appears in any of your monitored projects — no manual lookup required.
Stay ahead of Node.js vulnerabilities
Proactively identify and remediate vulnerabilities in your Node.js projects. Use NextGuard to monitor your nodejs dependencies and receive alerts on new threats.
Start MonitoringFrequently asked questions
Multiple vulnerabilities in jsrsasign have been identified and patched in version 11.1.1. It is crucial to update to the latest version to mitigate potential risks. See all nodejs vulnerabilities.
Related topics