Description
When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
Published: 2026-03-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Certificate impersonation due to bypassed email constraints
Action: Patch Now
AI Analysis

Impact

The Go standard library’s crypto/x509 package contains a flaw that causes it to ignore all email address constraints except the last one when a certificate contains multiple constraints that share a local part but differ by domain. This defect allows a malicious certificate to bypass intended email address restrictions, enabling an attacker to forge a certificate that will be accepted as valid for an address it should not be allowed to represent. The vulnerability is classified as a CWE‑295 (Improper Restriction of Operations within the Bounds of a Memory Buffer or a Function).

Affected Systems

The affected product is the Go standard library’s crypto/x509 package. Any Go application that uses the default certificate verification routines—including web servers, HTTPS clients, email systems, and other services that validate X.509 certificates—could be impacted. No specific version range is provided in the advisory, so all releases before the fix should be considered vulnerable until an update is applied.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity risk, but the EPSS score of less than 1 % shows that the current odds of exploitation are very low, and the vulnerability is not listed in the CISA KEV catalog. The flaw can be exploited in any context where a Go program accepts or validates certificates that include email constraints. An attacker could deliver a crafted certificate chain to a vulnerable application, tricking it into accepting a certificate that does not meet the intended email restrictions and potentially allowing impersonation or unauthorized access.

Generated by OpenCVE AI on April 16, 2026 at 11:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Go runtime to the latest stable release that incorporates the email constraint enforcement fix.
  • Audit all Go‑based applications to ensure they use the updated crypto/x509 package before redeploying.
  • Implement an explicit audit of email address constraints in certificate validation logic to detect any remaining unvalidated constraints, especially for applications that cannot be immediately recompiled.

Generated by OpenCVE AI on April 16, 2026 at 11:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Golang
Golang go
CPEs cpe:2.3:a:golang:go:1.26.0:*:*:*:*:*:*:*
Vendors & Products Golang
Golang go

Wed, 11 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-295
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Go Standard Library
Go Standard Library crypto Tls
Vendors & Products Go Standard Library
Go Standard Library crypto Tls

Fri, 06 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
Description When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
Title Incorrect enforcement of email constraints in crypto/x509
References

Subscriptions

Go Standard Library Crypto Tls
Golang Go
cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-03-10T13:32:53.202Z

Reserved: 2026-02-17T19:57:28.434Z

Link: CVE-2026-27137

cve-icon Vulnrichment

Updated: 2026-03-10T13:32:37.164Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T22:16:00.850

Modified: 2026-04-21T14:40:31.187

Link: CVE-2026-27137

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-06T21:28:13Z

Links: CVE-2026-27137 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:15:27Z

Weaknesses