-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stems from processing raw XML instead of canonicalized XML for validation. The Go vulnerability report (GO-2023-1826) explicitly states that Validate was unsafe as it didn't return canonicalized data, while ValidateReferences (the patched alternative) does. Release notes confirm Validate was removed in v1.1.0, and the CVE/GHSA both reference signature validation bypass through XML parsing discrepancies - all strongly implicating the Validate() function as the vulnerable component.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/moov-io/signedxml | go | < 1.1.0 | 1.1.0 |