Improper Following of Specification by Caller Affecting @bsv/sdk package, versions <2.0.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-BSVSDK-15307716
  • published18 Feb 2026
  • disclosed17 Feb 2026
  • creditF1r3Hydr4nt

Introduced: 17 Feb 2026

NewCVE-2025-69287  (opens in a new tab)
CWE-573  (opens in a new tab)

How to fix?

Upgrade @bsv/sdk to version 2.0.0 or higher.

Overview

@bsv/sdk is a BSV Blockchain Software Development Kit

Affected versions of this package are vulnerable to Improper Following of Specification by Caller in the Peer class, used by the processInitialRequest and processInitialResponse methods. An attacker can cause a signature to be insufficiently validated, which may lead to incompatibility with other SDK implementations using mutual BRC-104 authentication. When the affected methods prepare signatures, they concatenate nonce strings before encoding, thus losing entropy, compared to the protocol specification and to other implementations.

References

CVSS Base Scores

version 4.0
version 3.1