CVE-2026-39984
Received Received - Intake
Authorization Bypass in Sigstore Timestamp Verification Package

Publication date: 2026-04-15

Last updated on: 2026-04-23

Assigner: GitHub, Inc.

Description
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Versions 2.0.5 and below contain an authorization bypass vulnerability in the VerifyTimestampResponse function. VerifyTimestampResponse correctly verifies the certificate chain signature, but the TSA-specific constraint checks in VerifyLeafCert uses the first non-CA certificate from the PKCS#7 certificate bag instead of the leaf certificate from the verified chain. An attacker can exploit this by prepending a forged certificate to the certificate bag while the message is signed with an authorized key, causing the library to validate the signature against one certificate but perform authorization checks against another. This vulnerability only affects users of the timestamp-authority/v2/pkg/verification package and does not affect the timestamp-authority service itself or sigstore-go. The issue has been fixed in version 2.0.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-15
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-04-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linuxfoundation sigstore_timestamp_authority to 2.0.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-295 The product does not validate, or incorrectly validates, a certificate.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an attacker to bypass authorization controls, impacting the integrity of the timestamp verification process.

However, there is no direct information provided about its impact on compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

CVE-2026-39984 is an authorization bypass vulnerability in the Sigstore Timestamp Authority's Go package `timestamp-authority/v2/pkg/verification` (versions 2.0.5 and below). The issue occurs in the `VerifyTimestampResponse` function, which correctly verifies the certificate chain signature but incorrectly performs TSA-specific constraint checks using the first non-CA certificate from the PKCS#7 certificate bag instead of the actual leaf certificate from the verified chain.

An attacker can exploit this by prepending a forged certificate to the certificate bag while the message is signed with an authorized key. This causes the library to validate the signature against one certificate but perform authorization checks against another, effectively bypassing authorization controls.

This vulnerability affects only users of the `timestamp-authority/v2/pkg/verification` package and does not impact the timestamp-authority service itself or the `sigstore-go` client. The issue has been fixed in version 2.0.6.


How can this vulnerability impact me? :

This vulnerability allows an attacker to bypass authorization controls without needing privileges, although user interaction is required. The attack complexity is low and the scope remains unchanged.

The impact is on the integrity of the system, meaning an attacker could cause unauthorized actions or validations to succeed by exploiting the improper certificate validation. However, confidentiality and availability are not affected.

It only affects users who directly use the vulnerable verification package and not the broader timestamp-authority service or the sigstore-go client.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves improper certificate validation in the VerifyTimestampResponse function of the timestamp-authority/v2/pkg/verification package. Detection would require inspecting the usage of this package and verifying if the affected versions (2.0.5 and below) are in use.

Since the issue is specific to the certificate validation logic within the Go package, detection on a network or system level is not straightforward through typical network commands.

A practical approach is to check the version of the sigstore timestamp-authority package in your environment. For example, if you have the Go module installed, you can run commands like:

  • go list -m github.com/sigstore/timestamp-authority@v2
  • go mod graph | grep timestamp-authority

Additionally, reviewing your code or binaries to see if the VerifyTimestampResponse function is called without the TSACertificate option can help identify vulnerable usage.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed in version 2.0.6 of the sigstore timestamp-authority package. The immediate step is to upgrade to version 2.0.6 or later.

As a workaround before upgrading, users can specify the exact expected certificate using the TSACertificate option in the VerifyTimestampResponse function. This fully mitigates the issue by ensuring correct certificate validation.

Ensure that your environment does not use the vulnerable versions (2.0.5 and below) of the timestamp-authority/v2/pkg/verification package.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart