CVE-2025-6545

| EUVD-2025-18922 CRITICAL
2025-06-23 7ffcee3d-2c14-4c3e-b844-86c6a321a158 GHSA-h7cp-r72f-jxh6
9.1
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:H/SI:H/SA:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 15, 2026 - 22:10 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:10 euvd
EUVD-2025-18922
CVE Published
Jun 23, 2025 - 19:15 nvd
CRITICAL 9.1

DescriptionNVD

Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation. This vulnerability is associated with program files lib/to-buffer.Js.

This issue affects pbkdf2: from 3.0.10 through 3.1.2.

AnalysisAI

CVE-2025-6545 is an improper input validation vulnerability in the pbkdf2 library (versions 3.0.10 through 3.1.2) affecting the lib/to-buffer.js file that enables signature spoofing through inadequate validation mechanisms. Attackers with network access and minimal attack complexity can compromise the integrity of PBKDF2-derived cryptographic signatures, potentially allowing unauthorized authentication or data tampering. The high CVSS score of 9.1 reflects critical integrity and scope impacts, though real-world exploitation likelihood depends on confirmation of active exploitation and proof-of-concept availability.

Technical ContextAI

PBKDF2 (Password-Based Key Derivation Function 2) is a widely-used cryptographic key derivation function standardized in RFC 2898, commonly employed in password hashing and signature generation workflows. The vulnerability resides in lib/to-buffer.js, which handles input conversion to buffer format—a critical preprocessing step before cryptographic operations. The root cause is CWE-20 (Improper Input Validation), indicating that the library fails to properly validate or sanitize input data before processing it through the PBKDF2 algorithm. This allows an attacker to craft malformed or unexpected input that bypasses validation checks, leading to signature spoofing where invalid signatures are accepted as legitimate. The affected CPE scope includes pbkdf2 package versions 3.0.10 through 3.1.2, commonly deployed in Node.js environments and web authentication systems.

Affected ProductsAI

pbkdf2 library versions 3.0.10, 3.0.11, 3.1.0, 3.1.1, and 3.1.2 are affected. CPE identifier: cpe:2.3:a:pbkdf2_project:pbkdf2:*:*:*:*:*:node.js:*:* with version constraints [3.0.10, 3.1.2]. This primarily affects Node.js applications and JavaScript/TypeScript projects that import pbkdf2 as a dependency. Secondary impact on any application or framework (Express.js, Next.js, Fastify, etc.) that transitively depends on pbkdf2 for authentication or signature validation. Web applications using pbkdf2 for OAuth token validation or JWT signature verification are particularly at risk.

RemediationAI

Immediate action: Update pbkdf2 to version 3.1.3 or later (post-patch version presumed available based on vulnerability disclosure). For npm-based projects: execute 'npm update pbkdf2' or specify '^3.1.3' in package.json and run 'npm install'. For yarn users: 'yarn upgrade pbkdf2@^3.1.3'. Verify the patch addresses lib/to-buffer.js input validation by reviewing the changelog or vendor advisory. Temporary mitigation if patching is delayed: implement additional input validation upstream of PBKDF2 calls, validate signature inputs against expected format before processing, or implement signature verification via alternate cryptographic libraries pending patch availability. Organizations should audit recent authentication logs for potential signature spoofing (failed or anomalous authentication attempts) if compromise window is unknown.

Vendor StatusVendor

Ubuntu

Priority: Medium
node-pbkdf2
Release Status Version
bionic needs-triage -
focal needs-triage -
jammy needs-triage -
noble needs-triage -
upstream needs-triage -
plucky ignored end of life, was needs-triage
oracular ignored end of life, was needs-triage
questing needs-triage -

Debian

Bug #1108283
node-pbkdf2
Release Status Fixed Version Urgency
bullseye vulnerable 3.1.1-1 -
bookworm, trixie vulnerable 3.1.2-3 -
forky, sid fixed 3.1.5+~3.1.2-1 -
(unstable) fixed 3.1.3+~3.1.2-1 -

Share

CVE-2025-6545 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy