{"id":"CVE-2023-34205","details":"In Moov signedxml through 1.0.0, parsing the raw XML (as received) can result in different output than parsing the canonicalized XML. Thus, signature validation can be bypassed via a Signature Wrapping attack (aka XSW).","aliases":["GHSA-jqvr-j2vg-gjrv","GO-2023-1826"],"modified":"2026-03-14T12:07:21.519061Z","published":"2023-05-30T04:15:10.377Z","references":[{"type":"REPORT","url":"https://github.com/moov-io/signedxml/issues/23"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/moov-io/signedxml","events":[{"introduced":"0"},{"last_affected":"51e2e8725af4bf9cb3c93805d498fbc370e5eba3"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.0.0"}]}}],"versions":["v1.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-34205.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}