Potential Timing Attack in SignXML Implementation by XML Security
CVE-2025-48995

6.9MEDIUM

Key Information:

Status
Vendor
CVE Published:
2 June 2025

What is CVE-2025-48995?

The SignXML library, which implements the W3C XML Signature standard in Python, is susceptible to a timing attack due to its improper handling of signature verification. Specifically, when the X509 certificate validation is disabled and a shared HMAC key is used, the library may inadvertently leak information about the correct HMAC during hash comparisons. This vulnerability exists in SignXML versions prior to 4.0.4, allowing malicious users to exploit timing discrepancies to reconstruct valid HMAC values for arbitrary data, thereby compromising the integrity of the verification process. For details on the vulnerability, please visit the references provided.

Affected Version(s)

signxml < 4.0.4

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.