Improper Verification of Cryptographic Signature Affecting bsv-sdk package, versions <0.8.2


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUBY-BSVSDK-16068884
  • published15 Apr 2026
  • disclosed9 Apr 2026
  • creditSimon Bettison

Introduced: 9 Apr 2026

NewCVE-2026-40070  (opens in a new tab)
CWE-347  (opens in a new tab)

How to fix?

Upgrade bsv-sdk to version 0.8.2 or higher.

Overview

bsv-sdk is an A Ruby library for interacting with the BSV Blockchain — keys, scripts, transactions, and more.

Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in the acquire_certificate function. An attacker can persist forged certificate records by supplying arbitrary signatures or by controlling a certifier endpoint, causing downstream processes to treat these forged certificates as authentic. This can lead to unauthorized assertion of identity attributes and pollution of the credential store with attacker-controlled data.

Workaround

This vulnerability can be mitigated by restricting access to acquire_certificate to trusted callers only, avoiding the use of untrusted certifier URLs with the issuance protocol, enforcing TLS for such requests, and performing out-of-band verification of certificates before relying on their contents.

CVSS Base Scores

version 4.0
version 3.1