Improper Certificate Validation Affecting github.com/sigstore/cosign/pkg/cosign package, versions <3.0.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMSIGSTORECOSIGNPKGCOSIGN-15323169
  • published20 Feb 2026
  • disclosed19 Feb 2026
  • credit1seal

Introduced: 19 Feb 2026

CVE-2026-24122  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade github.com/sigstore/cosign/pkg/cosign to version 3.0.5 or higher.

Overview

Affected versions of this package are vulnerable to Improper Certificate Validation due to improper validation of certificate chains during signature verification when transparency log verification is skipped. An attacker can cause acceptance of signatures with expired intermediate certificates by providing a certificate chain where the intermediate certificate has expired before the leaf certificate, potentially allowing unauthorized signature validation.

Note:

No impact to users of the public Sigstore infrastructure. This may affect private deployments with customized PKIs. In practice, this is unlikely to occur as CAs should not be issuing certificates that outlive the validity of the CA and its parents.

References

CVSS Base Scores

version 4.0
version 3.1