Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
Typedeb
Namespacedebian
Namewolfssl
Version5.8.4-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.9.0-0.1
Latest_non_vulnerable_version5.9.0-0.2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-8735-ectc-j7a3
vulnerability_id VCID-8735-ectc-j7a3
summary With TLS 1.2 connections a client can use any digest, specifically a weaker digest that is supported, rather than those in the CertificateRequest.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-12889
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03507
published_at 2026-04-13T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03533
published_at 2026-04-12T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03556
published_at 2026-04-02T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.0357
published_at 2026-04-04T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03581
published_at 2026-04-07T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03583
published_at 2026-04-08T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03605
published_at 2026-04-09T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03562
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-12889
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12889
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121205
reference_id 1121205
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121205
3
reference_url https://github.com/wolfSSL/wolfssl/pull/9395
reference_id 9395
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:15:50Z/
url https://github.com/wolfSSL/wolfssl/pull/9395
fixed_packages
0
url pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
purl pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.8.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
purl pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie
aliases CVE-2025-12889
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8735-ectc-j7a3
1
url VCID-9kev-ferz-5bhr
vulnerability_id VCID-9kev-ferz-5bhr
summary Multiple constant-time implementations in wolfSSL before version 5.8.4 may be transformed into non-constant-time binary by LLVM optimizations, which can potentially result in observable timing discrepancies and lead to information disclosure through timing side-channel attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13912
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05169
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05219
published_at 2026-04-07T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05252
published_at 2026-04-08T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05271
published_at 2026-04-09T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05239
published_at 2026-04-11T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05197
published_at 2026-04-04T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06981
published_at 2026-04-13T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06986
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13912
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13912
2
reference_url https://github.com/wolfSSL/wolfssl/pull/9148
reference_id 9148
reference_type
scores
0
value 1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-11T19:19:06Z/
url https://github.com/wolfSSL/wolfssl/pull/9148
fixed_packages
0
url pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
purl pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.8.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
purl pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie
aliases CVE-2025-13912
risk_score 0.5
exploitability 0.5
weighted_severity 0.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9kev-ferz-5bhr
2
url VCID-cxhw-3w24-dkes
vulnerability_id VCID-cxhw-3w24-dkes
summary The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11932
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02488
published_at 2026-04-13T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.0249
published_at 2026-04-12T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02486
published_at 2026-04-02T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02499
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02502
published_at 2026-04-08T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02523
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.025
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11932
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11932
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121197
reference_id 1121197
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121197
3
reference_url https://github.com/wolfSSL/wolfssl/pull/9223
reference_id 9223
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:17:20Z/
url https://github.com/wolfSSL/wolfssl/pull/9223
fixed_packages
0
url pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
purl pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.8.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
purl pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie
aliases CVE-2025-11932
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cxhw-3w24-dkes
3
url VCID-gcfd-w8je-kqfm
vulnerability_id VCID-gcfd-w8je-kqfm
summary With TLS 1.3 pre-shared key (PSK) a malicious or faulty server could ignore the request for PFS (perfect forward secrecy) and the client would continue on with the connection using PSK without PFS. This happened when a server responded to a ClientHello containing psk_dhe_ke without a key_share extension. The re-use of an authenticated PSK connection that on the clients side unexpectedly did not have PFS, reduces the security of the connection.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11935
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01402
published_at 2026-04-13T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01415
published_at 2026-04-09T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01408
published_at 2026-04-11T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01401
published_at 2026-04-12T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01399
published_at 2026-04-02T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01404
published_at 2026-04-04T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01409
published_at 2026-04-07T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01414
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11935
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11935
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121200
reference_id 1121200
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121200
3
reference_url https://github.com/wolfSSL/wolfssl/pull/9112
reference_id 9112
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T18:43:57Z/
url https://github.com/wolfSSL/wolfssl/pull/9112
4
reference_url https://github.com/wolfSSL/wolfssl
reference_id wolfssl
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T18:43:57Z/
url https://github.com/wolfSSL/wolfssl
fixed_packages
0
url pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
purl pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.8.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
purl pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie
aliases CVE-2025-11935
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcfd-w8je-kqfm
4
url VCID-gdur-h588-vbb6
vulnerability_id VCID-gdur-h588-vbb6
summary Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256, if the client supports ECDSA P256.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11934
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03058
published_at 2026-04-13T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03131
published_at 2026-04-09T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03094
published_at 2026-04-11T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0307
published_at 2026-04-12T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03087
published_at 2026-04-02T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03101
published_at 2026-04-04T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03102
published_at 2026-04-07T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03107
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11934
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11934
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121199
reference_id 1121199
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121199
3
reference_url https://github.com/wolfSSL/wolfssl/pull/9113
reference_id 9113
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:22:47Z/
url https://github.com/wolfSSL/wolfssl/pull/9113
4
reference_url https://github.com/wolfSSL/wolfssl
reference_id wolfssl
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:22:47Z/
url https://github.com/wolfSSL/wolfssl
fixed_packages
0
url pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
purl pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.8.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
purl pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie
aliases CVE-2025-11934
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gdur-h588-vbb6
5
url VCID-hk8r-kk4v-1fa7
vulnerability_id VCID-hk8r-kk4v-1fa7
summary Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-12888
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04815
published_at 2026-04-13T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04836
published_at 2026-04-12T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04786
published_at 2026-04-02T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04809
published_at 2026-04-04T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04826
published_at 2026-04-07T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04864
published_at 2026-04-08T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04881
published_at 2026-04-09T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04859
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-12888
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12888
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121204
reference_id 1121204
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121204
fixed_packages
0
url pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
purl pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.8.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
purl pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie
aliases CVE-2025-12888
risk_score 0.2
exploitability 0.5
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hk8r-kk4v-1fa7
6
url VCID-khur-3ax7-9fhb
vulnerability_id VCID-khur-3ax7-9fhb
summary Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an application.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11931
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05616
published_at 2026-04-13T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05622
published_at 2026-04-12T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0556
published_at 2026-04-02T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05598
published_at 2026-04-04T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05594
published_at 2026-04-07T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05633
published_at 2026-04-08T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05658
published_at 2026-04-09T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05631
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11931
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11931
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121196
reference_id 1121196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121196
3
reference_url https://github.com/wolfSSL/wolfssl/pull/9223
reference_id 9223
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T15:41:59Z/
url https://github.com/wolfSSL/wolfssl/pull/9223
fixed_packages
0
url pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
purl pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.8.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
purl pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie
aliases CVE-2025-11931
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-khur-3ax7-9fhb
7
url VCID-njbj-f91t-b7f4
vulnerability_id VCID-njbj-f91t-b7f4
summary Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11933
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17545
published_at 2026-04-13T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17626
published_at 2026-04-09T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17644
published_at 2026-04-11T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17598
published_at 2026-04-12T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17708
published_at 2026-04-02T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17755
published_at 2026-04-04T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17476
published_at 2026-04-07T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17566
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11933
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11933
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121198
reference_id 1121198
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121198
3
reference_url https://github.com/wolfSSL/wolfssl/pull/9132
reference_id 9132
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:20:56Z/
url https://github.com/wolfSSL/wolfssl/pull/9132
4
reference_url https://github.com/wolfSSL/wolfssl
reference_id wolfssl
reference_type
scores
0
value 2.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:20:56Z/
url https://github.com/wolfSSL/wolfssl
fixed_packages
0
url pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
purl pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.8.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
purl pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie
aliases CVE-2025-11933
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njbj-f91t-b7f4
8
url VCID-xxkx-w5pc-5uap
vulnerability_id VCID-xxkx-w5pc-5uap
summary Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending a crafted ClientHello message containing duplicate KeyShareEntry values for the same supported group, leading to excessive CPU and memory consumption during ClientHello processing.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11936
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13366
published_at 2026-04-13T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13473
published_at 2026-04-09T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13447
published_at 2026-04-11T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13412
published_at 2026-04-12T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13483
published_at 2026-04-02T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13544
published_at 2026-04-04T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.1334
published_at 2026-04-07T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13423
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11936
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11936
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121202
reference_id 1121202
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121202
3
reference_url https://github.com/wolfSSL/wolfssl/pull/9117
reference_id 9117
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:19:13Z/
url https://github.com/wolfSSL/wolfssl/pull/9117
4
reference_url https://github.com/wolfSSL/wolfssl
reference_id wolfssl
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:19:13Z/
url https://github.com/wolfSSL/wolfssl
fixed_packages
0
url pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
purl pkg:deb/debian/wolfssl@5.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.8.4-1%3Fdistro=trixie
1
url pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
purl pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie
aliases CVE-2025-11936
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xxkx-w5pc-5uap
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.8.4-1%3Fdistro=trixie