Vulnerability Description
xmlseclibs is a library written in PHP for working with XML Encryption and Signatures. Prior to 3.1.5, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use this to brute-force an authentication tag, recover the GHASH key, and decrypt the encrypted nodes. It also allows to forge arbitrary ciphertexts without knowing the encryption key. This vulnerability is fixed in 3.1.5.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xmlseclibs Project | Xmlseclibs | < 3.1.5 |
Related Weaknesses (CWE)
References
- https://github.com/robrichards/xmlseclibs/commit/03062be78178cbb5e8f605cd255dc32Patch
- https://github.com/robrichards/xmlseclibs/releases/tag/3.1.5Product
- https://github.com/robrichards/xmlseclibs/security/advisories/GHSA-4v26-v6cg-g6fExploitVendor Advisory
FAQ
What is CVE-2026-32313?
CVE-2026-32313 is a vulnerability with a CVSS score of 8.2 (HIGH). xmlseclibs is a library written in PHP for working with XML Encryption and Signatures. Prior to 3.1.5, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the a...
How severe is CVE-2026-32313?
CVE-2026-32313 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32313?
Check the references section above for vendor advisories and patch information. Affected products include: Xmlseclibs Project Xmlseclibs.