We found results for “”
CVE-2025-64767
Good to know:
Date: November 21, 2025
hpke-js is a Hybrid Public Key Encryption (HPKE) module built on top of Web Cryptography API. Prior to version 1.7.5, the public SenderContext Seal() API has a race condition which allows for the same AEAD nonce to be re-used for multiple Seal() calls. This can lead to complete loss of Confidentiality and Integrity of the produced messages. This issue has been patched in version 1.7.5.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Reusing a Nonce, Key Pair in Encryption
CWE-323Top Fix
Upgrade Version
Upgrade to version @hpke/core - 1.7.5;https://github.com/dajiaji/hpke-js.git - @hpke/core@1.7.5
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


