Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/russellhaering/goxmldsig
  4. ›
  5. GHSA-479m-364c-43vc

GHSA-479m-364c-43vc: validateSignature Loop Variable Capture Signature Bypass in goxmldsig

March 18, 2026

This vulnerability lets an attacker get around integrity checks for certain signed elements by replacing their content with the content from another element that is also referenced in the same signature.


References

  • github.com/advisories/GHSA-479m-364c-43vc
  • github.com/russellhaering/goxmldsig
  • github.com/russellhaering/goxmldsig/security/advisories/GHSA-479m-364c-43vc

Code Behaviors & Features

Detect and mitigate GHSA-479m-364c-43vc with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.6.0

Fixed versions

  • 1.6.0

Solution

Upgrade to version 1.6.0 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-347: Improper Verification of Cryptographic Signature
  • CWE-682: Incorrect Calculation

Source file

go/github.com/russellhaering/goxmldsig/GHSA-479m-364c-43vc.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:01 +0000.