The vulnerability GHSA-pgx9-497m-6c4v in sm-crypto allows for private key recovery. The analysis of the fixing commit b1c824e58fdf1eaa73692c124a095819a8c45707 reveals that the doDecrypt function in src/sm2/index.js was the source of this vulnerability. It failed to validate a crucial component of the input ciphertext, a point c1 on the elliptic curve. This allowed an attacker to send crafted ciphertexts and, through repeated interactions, deduce the private key. The patch adds the necessary validation for c1. Additionally, the same commit patched the doVerifySignature function to add validation for signature components and the public key, indicating that this function was also vulnerable to potential attacks, although the primary vulnerability described is in doDecrypt.