Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. wolfssl
  4. ›
  5. CVE-2025-15346

CVE-2025-15346: wolfSSL Python module vulnerable to Improper Authentication

January 8, 2026 (updated January 30, 2026)

A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced.

Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided.

This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake.

The issue affects versions up to and including 5.8.2.

References

  • github.com/advisories/GHSA-vj87-jj27-4h9c
  • github.com/wolfSSL/wolfssl-py
  • github.com/wolfSSL/wolfssl-py/commit/b4517dece79f682a8f453abce5cfc0b81bae769d
  • github.com/wolfSSL/wolfssl-py/pull/62
  • github.com/wolfSSL/wolfssl-py/releases/tag/v5.8.4-stable
  • nvd.nist.gov/vuln/detail/CVE-2025-15346

Code Behaviors & Features

Detect and mitigate CVE-2025-15346 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.8.4.post0

Fixed versions

  • 5.8.4.post0

Solution

Upgrade to version 5.8.4.post0 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication

Source file

pypi/wolfssl/CVE-2025-15346.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:36:21 +0000.