{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5504","assignerOrgId":"50d2cd11-d01a-48ed-9441-5bfce9d63b27","state":"PUBLISHED","assignerShortName":"wolfSSL","dateReserved":"2026-04-03T16:06:24.620Z","datePublished":"2026-04-09T22:33:42.179Z","dateUpdated":"2026-04-14T14:34:40.546Z"},"containers":{"cna":{"providerMetadata":{"orgId":"50d2cd11-d01a-48ed-9441-5bfce9d63b27","shortName":"wolfSSL","dateUpdated":"2026-04-09T22:33:42.179Z"},"title":"PKCS7 CBC Padding Oracle — Plaintext Recovery","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-354","description":"CWE-354 Improper validation of integrity check value","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-463","descriptions":[{"lang":"en","value":"CAPEC-463 Padding Oracle Crypto Attack"}]}],"affected":[{"vendor":"wolfSSL","product":"wolfSSL","modules":["PKCS7"],"programFiles":["wolfcrypt/src/pkcs7.c"],"versions":[{"status":"affected","version":"0","lessThanOrEqual":"5.9.0","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A padding oracle exists in wolfSSL's PKCS7 CBC decryption that could allow an attacker to recover plaintext through repeated decryption queries with modified ciphertext. In previous versions of wolfSSL the interior padding bytes are not validated.","supportingMedia":[{"type":"text/html","base64":false,"value":"A padding oracle exists in wolfSSL's PKCS7 CBC decryption that could allow an attacker to recover plaintext through repeated decryption queries with modified ciphertext. In previous versions of wolfSSL the interior padding bytes are not validated."}]}],"references":[{"url":"https://github.com/wolfSSL/wolfssl/pull/10088"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"MEDIUM","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"}}],"credits":[{"lang":"en","value":"Sunwoo Lee of Korea Institute of Energy Technology (KENTECH) for the report.","type":"finder"},{"lang":"en","value":"Woohyun Choi of Korea Institute of Energy Technology (KENTECH) for the report.","type":"finder"},{"lang":"en","value":"Seunghyun Yoon of Korea Institute of Energy Technology (KENTECH) for the report.","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-14T14:33:56.621704Z","id":"CVE-2026-5504","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-14T14:34:40.546Z"}}]}}