-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from improper signature length comparison in the verification process. The commit diff shows the Rust implementation in webhooks.rs was modified to add a length check before byte comparison. The advisory explicitly mentions Webhook::verify as the affected function, and the patch adds a critical length equality check (x.1.len() == expected_signature.len()) to prevent partial signature matches. Multiple sources (CVE, GHSA, RustSec) confirm this function was the vulnerable entry point.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| svix | rust | < 1.17.0 | 1.17.0 |