Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @axonflow/sdk
  4. ›
  5. GHSA-mph8-9v29-pm42

GHSA-mph8-9v29-pm42: axonflow-sdk-typescript: Webhook signing-key (HMAC-SHA256) not exposed by SDK type, preventing signature verification

May 6, 2026

The AxonFlow SDK’s WebhookSubscription (or equivalent) type did not expose the HMAC-SHA256 signing key returned by the platform’s CreateWebhook endpoint. Without access to the secret through the typed SDK API, callers had no path to verify the X-AxonFlow-Signature header on incoming webhook deliveries. Affected callers had two unsatisfactory options:

  1. Skip signature verification entirely — accepting any payload from any source that knew the webhook URL.
  2. Hand-parse the raw HTTP JSON response to extract the secret, bypassing the type-safe SDK surface.

This advisory is filed across all four AxonFlow SDKs (Go, Python, TypeScript, Java) because the same defect and the same fix landed in each.

References

  • github.com/advisories/GHSA-mph8-9v29-pm42
  • github.com/getaxonflow/axonflow-sdk-typescript
  • github.com/getaxonflow/axonflow-sdk-typescript/security/advisories/GHSA-mph8-9v29-pm42

Code Behaviors & Features

Detect and mitigate GHSA-mph8-9v29-pm42 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.0.0

Fixed versions

  • 6.0.0

Solution

Upgrade to version 6.0.0 or above.

Impact 5.9 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-345: Insufficient Verification of Data Authenticity
  • CWE-347: Improper Verification of Cryptographic Signature

Source file

npm/@axonflow/sdk/GHSA-mph8-9v29-pm42.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:19:05 +0000.