Timing Attack Affecting phpseclib/phpseclib package, versions <1.0.28>=2.0.0, <2.0.53>=3.0.0, <3.0.51


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-PHPSECLIBPHPSECLIB-15989082
  • published12 Apr 2026
  • disclosed10 Apr 2026
  • creditkodareef5

Introduced: 10 Apr 2026

NewCVE-2026-40194  (opens in a new tab)
CWE-208  (opens in a new tab)

How to fix?

Upgrade phpseclib/phpseclib to version 1.0.28, 2.0.53, 3.0.51 or higher.

Overview

phpseclib/phpseclib is a PHP Secure Communications Library - Pure-PHP implementations of RSA, AES, SSH2, SFTP, X.509 etc.

Affected versions of this package are vulnerable to Timing Attack via the get_binary_packet function. An attacker can potentially infer sensitive information about the HMAC value by measuring response times during SSH packet processing.

CVSS Base Scores

version 4.0
version 3.1