Security Advisories (2)
CVE-2025-15444 (2026-01-06)

Crypt::Sodium::XS module versions prior to 0.000042, for Perl, include a vulnerable version of libsodium libsodium <= 1.0.20 or a version of libsodium released before December 30, 2025 contains a vulnerability documented as CVE-2025-69277  https://www.cve.org/CVERecord?id=CVE-2025-69277 . The libsodium vulnerability states: In atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. 0.000042 includes a version of libsodium updated to 1.0.20-stable, released January 3, 2026, which includes a fix for the vulnerability.

CVE-2026-30910 (2026-03-08)

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryption and signatures, an undersized buffer could lead to buffer overflow. Encountering this issue is unlikely as the message length would need to be very large. For bin2hex the input size would have to be > SIZE_MAX / 2 For aegis encryption the input size would need to be > SIZE_MAX - 32U For other encryption the input size would need to be > SIZE_MAX - 16U For signatures the input size would need to be > SIZE_MAX - 64U

NAME

csxs-ppcrypt -- simple passphrase-based encryption and decryption

SYNOPSIS

csxs-ppcrypt -E myfile.txt
echo 'some output' | csxs-ppcrypt -E -o somefile.txt -

csxs-ppcrypt -D myfile.txt.csxspp
csxs-ppcrypt -D -o otherfile.txt somedir/somefile
csxs-ppcrypt -D -o - myfile.txt.csxpp

DESCRIPTION

csxs-ppcrypt encrypts or decrypts data from an input file (or stdin) to an output file (or stdout).

This is a simple demo program. It's not intended for much real-world use, but can still be handy. It is meant to be an example of using Crypt::Sodium::XS::secretstream. Encryption keys are generated from passphrase input using Crypt::Sodium::XS::pwhash.

USAGE

csxs-ppcrypt -h
csxs-ppcrypt -D [-o <outfile>] <infile>
csxs-ppcrypt -E [-o <outfile>] <infile>

actions:
  -h        print this help message and exit
  -D        decrypt
  -E        encrypt

options:
  -f        force; overwrite an existing <outfile>
  -o        output file (default: <infile>.csxspp)
arguments:
  <infile>  path to input file, or '-' for stdin
  <outfile> path to output file, or '-' for stdout

FILE FORMAT

From the start of a file encrypted with this tool, there is:

     4 bytes) magic value "CSXS"
     4 bytes) version number, little-endian
              placeholder, reserved for future use.
     4 bytes) "primitives" (algorithms) bitflag, little-endian
              placeholder, reserved for future use.
    16 bytes) salt for pwhash
     8 bytes) opslimit for pwhash
     8 bytes) memlimit for pwhash
    24 bytes) secretstream header
  4113 bytes) 0 or more complete encrypted blocks
              all have tag TAG_MESSAGE
<=4113 bytes) 1 final block
              must have tag TAG_FINAL

       no further data is allowed.

AUTHOR

Brad Barden <perlmodules@5c30.org>

COPYRIGHT & LICENSE

Copyright (c) 2025 Brad Barden

This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself.