hpke-js is a Hybrid Public Key Encryption (HPKE) module built on top of Web Cryptography API. Prior to version 1.7.5, the public SenderContext Seal() API has a race condition which allows for the same AEAD nonce to be re-used for multiple Seal() calls. This can lead to complete loss of Confidentiality and Integrity of the produced messages. This issue has been patched in version 1.7.5.
History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Dajiaji
Dajiaji hpke-js
Vendors & Products Dajiaji
Dajiaji hpke-js

Fri, 21 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 19:00:00 +0000

Type Values Removed Values Added
Description hpke-js is a Hybrid Public Key Encryption (HPKE) module built on top of Web Cryptography API. Prior to version 1.7.5, the public SenderContext Seal() API has a race condition which allows for the same AEAD nonce to be re-used for multiple Seal() calls. This can lead to complete loss of Confidentiality and Integrity of the produced messages. This issue has been patched in version 1.7.5.
Title hpke-js reuses AEAD nonces
Weaknesses CWE-323
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-21T19:01:11.833Z

Reserved: 2025-11-10T22:29:34.877Z

Link: CVE-2025-64767

cve-icon Vulnrichment

Updated: 2025-11-21T19:01:02.913Z

cve-icon NVD

Status : Received

Published: 2025-11-21T19:16:03.497

Modified: 2025-11-21T19:16:03.497

Link: CVE-2025-64767

cve-icon Redhat

No data.