CVE-2026-39984
Authorization Bypass in Sigstore Timestamp Verification Package
Publication date: 2026-04-15
Last updated on: 2026-04-23
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linuxfoundation | sigstore_timestamp_authority | to 2.0.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-295 | The product does not validate, or incorrectly validates, a certificate. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an attacker to bypass authorization controls, impacting the integrity of the timestamp verification process.
However, there is no direct information provided about its impact on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
CVE-2026-39984 is an authorization bypass vulnerability in the Sigstore Timestamp Authority's Go package `timestamp-authority/v2/pkg/verification` (versions 2.0.5 and below). The issue occurs in the `VerifyTimestampResponse` function, which correctly verifies the certificate chain signature but incorrectly performs TSA-specific constraint checks using the first non-CA certificate from the PKCS#7 certificate bag instead of the actual leaf certificate from the verified chain.
An attacker can exploit this by prepending a forged certificate to the certificate bag while the message is signed with an authorized key. This causes the library to validate the signature against one certificate but perform authorization checks against another, effectively bypassing authorization controls.
This vulnerability affects only users of the `timestamp-authority/v2/pkg/verification` package and does not impact the timestamp-authority service itself or the `sigstore-go` client. The issue has been fixed in version 2.0.6.
How can this vulnerability impact me? :
This vulnerability allows an attacker to bypass authorization controls without needing privileges, although user interaction is required. The attack complexity is low and the scope remains unchanged.
The impact is on the integrity of the system, meaning an attacker could cause unauthorized actions or validations to succeed by exploiting the improper certificate validation. However, confidentiality and availability are not affected.
It only affects users who directly use the vulnerable verification package and not the broader timestamp-authority service or the sigstore-go client.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves improper certificate validation in the VerifyTimestampResponse function of the timestamp-authority/v2/pkg/verification package. Detection would require inspecting the usage of this package and verifying if the affected versions (2.0.5 and below) are in use.
Since the issue is specific to the certificate validation logic within the Go package, detection on a network or system level is not straightforward through typical network commands.
A practical approach is to check the version of the sigstore timestamp-authority package in your environment. For example, if you have the Go module installed, you can run commands like:
- go list -m github.com/sigstore/timestamp-authority@v2
- go mod graph | grep timestamp-authority
Additionally, reviewing your code or binaries to see if the VerifyTimestampResponse function is called without the TSACertificate option can help identify vulnerable usage.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed in version 2.0.6 of the sigstore timestamp-authority package. The immediate step is to upgrade to version 2.0.6 or later.
As a workaround before upgrading, users can specify the exact expected certificate using the TSACertificate option in the VerifyTimestampResponse function. This fully mitigates the issue by ensuring correct certificate validation.
Ensure that your environment does not use the vulnerable versions (2.0.5 and below) of the timestamp-authority/v2/pkg/verification package.