Improper Verification of Cryptographic Signature Affecting openssl package, versions [3.5.0,3.5.5)[3.6.0,3.6.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-OPENSSL-15124523
  • published28 Jan 2026
  • disclosed27 Jan 2026
  • creditStanislav Fort

Introduced: 27 Jan 2026

CVE-2025-15469  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade openssl to version 3.5.5, 3.6.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in the openssl dgst command-line tool, which silently truncates input data to 16MB when using one-shot signing algorithms. Signatures for payloads larger than 16MB may appear to be valid although they are not fully verified.

Workflows that both sign and verify using the openssl dgst command are most likely to be exploitable, because other use cases will reject the signature. As a result, streaming digest algorithms for openssl dgst and library users are unaffected.

CVSS Base Scores

version 4.0
version 3.1