Description
An issue in ralphje Signify before v.0.9.2 allows a remote attacker to escalate privileges via the signed_data.py and the context.py components
Published: 2026-03-25
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation (Remote)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the Python implementation of Signify, affecting all releases prior to version 0.9.2. A remote attacker can manipulate the signed_data.py and context.py modules to perform a privilege escalation, which aligns with the CWE‑269 classification. By altering signed data handling, the attacker may obtain elevated permissions within the system, potentially allowing them to execute arbitrary code with higher privileges.

Affected Systems

The affected product is Signify, distributed under the Python package ralphje:signify. All versions before 0.9.2 are vulnerable; no other vendors or product versions are listed.

Risk and Exploitability

The vulnerability is scored highly with a CVSS value of 8.8, indicating significant potential impact. Exploit likelihood appears low, and it is not currently recorded as a known exploited vulnerability in the public catalog. The flaw is likely triggered by a remote actor who can provide crafted signed data to the vulnerable components, enabling the privilege escalation path described above.

Generated by OpenCVE AI on April 2, 2026 at 04:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Signify to version 0.9.2 or later
  • If an immediate upgrade is not feasible, restrict or isolate access to the signed_data.py and context.py modules to prevent exploitation
  • Monitor logs for any anomalies related to signed data handling and investigate promptly

Generated by OpenCVE AI on April 2, 2026 at 04:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-p4hh-mq57-gq8x Signify allows a remote attacker to escalate privileges via the signed_data.py and the context.py components
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Signed Data Handling in Signify

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ralphje:signify:*:*:*:*:*:python:*:*

Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Signed Data Handling in Signify

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Signed Data Validation in Signify
Weaknesses CWE-284

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Signed Data Validation in Signify
Weaknesses CWE-269
CWE-284
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Signed Data Parsing in ralphje Signify
Weaknesses CWE-285
CWE-732

Thu, 26 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Signed Data Parsing in ralphje Signify
Weaknesses CWE-285
CWE-732

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Title Remote Privilege Escalation via Signed Data Handling in Signify
Weaknesses CWE-264

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Ralphje
Ralphje signify
Vendors & Products Ralphje
Ralphje signify

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title Remote Privilege Escalation via Signed Data Handling in Signify
Weaknesses CWE-264

Wed, 25 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description An issue in ralphje Signify before v.0.9.2 allows a remote attacker to escalate privileges via the signed_data.py and the context.py components
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-27T19:43:12.486Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-70887

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T19:16:28.130

Modified: 2026-04-01T13:59:07.700

Link: CVE-2025-70887

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:59:18Z

Weaknesses