CVE-2026-24408
BaseFortify
Publication date: 2026-01-26
Last updated on: 2026-03-02
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linuxfoundation | sigstore-python | to 4.2.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in sigstore-python versions prior to 4.2.0 involves the OAuth authentication flow being susceptible to Cross-Site Request Forgery (CSRF). Although the tool creates a unique "state" parameter during authentication requests, it does not properly verify that the "state" returned by the server matches the original, allowing an attacker to potentially perform unauthorized actions by exploiting this flaw.
How can this vulnerability impact me? :
The vulnerability could allow an attacker to perform unauthorized actions on behalf of a user by exploiting the CSRF weakness in the OAuth authentication flow. This could lead to security risks such as unauthorized access or manipulation of signature verification processes within sigstore-python.
What immediate steps should I take to mitigate this vulnerability?
Upgrade sigstore-python to version 4.2.0 or later, as this version contains a patch that fixes the Cross-Site Request Forgery vulnerability in the OAuth authentication flow.