Unchecked Return Value Affecting sigstore package, versions <0.2.3


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUBY-SIGSTORE-15627891
  • published15 Mar 2026
  • disclosed11 Mar 2026
  • creditKasumi Hanazuki

Introduced: 11 Mar 2026

NewCVE-2026-31830  (opens in a new tab)
CWE-252  (opens in a new tab)

How to fix?

Upgrade sigstore to version 0.2.3 or higher.

Overview

Affected versions of this package are vulnerable to Unchecked Return Value due to improper handling of the return value from the verify_in_toto function. An attacker can cause the verification process to incorrectly indicate success for DSSE bundles with mismatched in-toto subject digests by presenting a valid signed DSSE bundle for one artifact as a valid attestation for a different artifact.

CVSS Base Scores

version 4.0
version 3.1