Description
Versions of the package jsrsasign before 11.1.1 are vulnerable to Division by zero due to the RSASetPublic/KEYUTIL parsing path in ext/rsa.js and the BigInteger.modPowInt reduction logic in ext/jsbn.js. An attacker can force RSA public-key operations (e.g., verify and encryption) to collapse to deterministic zero outputs and hide “invalid key” errors by supplying a JWK whose modulus decodes to zero.
Scores
CVSS v3
5.9
EPSS
0.0001
EPSS Percentile
1.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-369
Status
published
Products (3)
jsrsasign_project/jsrsasign
< 11.1.1
n/a/jsrsasign
< 11.1.1
npm/jsrsasign
0 - 11.1.1npm
Published
Mar 23, 2026
Tracked Since
Mar 23, 2026