Description
sigstore-python is a Python tool for generating and verifying Sigstore signatures. Prior to version 4.2.0, the sigstore-python OAuth authentication flow is susceptible to Cross-Site Request Forgery. `_OAuthSession` creates a unique "state" and sends it as a parameter in the authentication request but the "state" in the server response seems not not be cross-checked with this value. Version 4.2.0 contains a patch for the issue.
Published: 2026-01-26
Score: 0 Low
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery in OIDC authentication could let an attacker force a signed payload to appear authentic
Action: Patch
AI Analysis

Impact

The vulnerability allows a malicious actor to exploit the OAuth flow used by sigstore‑python because the "state" value sent in the authentication request is not verified against the value returned by the identity provider. This omission can enable a CSRF attack that forces a user to authenticate and sign data without their consent, potentially generating signatures that are trusted by downstream systems.

Affected Systems

Linux Foundation’s sigstore‑python library, any installation of versions earlier than 4.2.0 used for generating or verifying Sigstore signatures. The patch was released in version 4.2.0 and removes the state‑verification flaw.

Risk and Exploitability

The EPSS score is below 1 % and the vulnerability is not listed in CISA’s KEV catalog, suggesting a low probability of exploitation in the wild. However, the attack vector is a classic CSRF scenario, making it trivial to construct if the application exposes the login flow to a web context. Given the potential for forged signatures, the risk to integrity and trust is significant even with a low exploitation likelihood.

Generated by OpenCVE AI on April 18, 2026 at 02:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update sigstore‑python to version 4.2.0 or later, which includes the state‑verification fix.
  • If an immediate update is not possible, add rejection logic that verifies the "state" parameter in the OAuth response against the original value used in the request.
  • Audit all environments to locate older sigstore‑python installations and prioritize their upgrade to the patched version.

Generated by OpenCVE AI on April 18, 2026 at 02:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hm8f-75xx-w2vr sigstore CSRF possibility in OIDC authentication during signing
History

Mon, 02 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation sigstore-python
CPEs cpe:2.3:a:linuxfoundation:sigstore-python:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation sigstore-python

Tue, 27 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Sigstore
Sigstore sigstore-python
Vendors & Products Sigstore
Sigstore sigstore-python

Mon, 26 Jan 2026 22:30:00 +0000

Type Values Removed Values Added
Description sigstore-python is a Python tool for generating and verifying Sigstore signatures. Prior to version 4.2.0, the sigstore-python OAuth authentication flow is susceptible to Cross-Site Request Forgery. `_OAuthSession` creates a unique "state" and sends it as a parameter in the authentication request but the "state" in the server response seems not not be cross-checked with this value. Version 4.2.0 contains a patch for the issue.
Title sigstore has CSRF possibility in OIDC authentication during signing
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N'}


Subscriptions

Linuxfoundation Sigstore-python
Sigstore Sigstore-python
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-27T21:35:14.119Z

Reserved: 2026-01-22T18:19:49.174Z

Link: CVE-2026-24408

cve-icon Vulnrichment

Updated: 2026-01-27T21:35:10.160Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T23:16:08.973

Modified: 2026-03-02T21:19:25.777

Link: CVE-2026-24408

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:45:27Z

Weaknesses