Description
sigstore-ruby is a pure Ruby implementation of the sigstore verify command from the sigstore/cosign project. Prior to 0.2.3, Sigstore::Verifier#verify does not propagate the VerificationFailure returned by verify_in_toto when the artifact digest does not match the digest in the in-toto attestation subject. As a result, verification of DSSE bundles containing in-toto statements returns VerificationSuccess regardless of whether the artifact matches the attested subject. This vulnerability is fixed in 0.2.3.
Published: 2026-03-10
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Integrity compromise from verification bypass
Action: Apply patch
AI Analysis

Impact

Sigstore-Ruby is a pure Ruby library that emulates the sigstore verify command, a tool used to attest digital signatures on software artifacts. The vulnerability stems from the Verifier#verify method, which fails to propagate a VerificationFailure returned by the underlying verify_in_toto routine when the artifact digest does not match the digest listed in the in‑toto attestation subject. As a result, any DSSE bundle containing an in‑toto statement that references a different artifact is still reported as VerificationSuccess. This failure path allows an attacker to supply a malicious artifact and have the verifier believe it is legitimate, effectively bypassing integrity checks and enabling the deployment of tampered software.

Affected Systems

The affected product is Sigstore::Ruby, part of the sigstore/sigstore-ruby project. Vulnerability exists in all releases prior to version 0.2.3. Users relying on older versions of the ruby library to validate DSSE bundles are susceptible.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity, and the EPSS score of less than 1% suggests low but nonzero exploitation probability. The vulnerability is not currently listed in the CISA KEV catalog, but its impact on software supply chain integrity is significant. Attackers can exploit the flaw by crafting a DSSE bundle with a mismatched subject digest and feeding it to any service or application that relies on Sigstore::Ruby for verification. Since the flaw is purely in the verification logic, the attack requires only the ability to supply a crafted bundle, making the attack vector relatively straightforward for remote contributors or automated build systems.

Generated by OpenCVE AI on April 16, 2026 at 03:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Sigstore::Ruby to version 0.2.3 or later, which includes the fix that correctly propagates verification failures for mismatched digests
  • Verify that the deployed Verifier#verify method returns a VerificationFailure when the artifact digest does not match the attestation subject, ensuring the integrity check is effective
  • Audit any existing verification pipelines that use older Sigstore::Ruby releases to identify and replace any instances that may have silently accepted tampered artifacts

Generated by OpenCVE AI on April 16, 2026 at 03:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mhg6-2q2v-9h2c sigstore-ruby verifier returns success for DSSE bundles with mismatched in-toto subject digest
History

Fri, 20 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Sigstore sigstore
CPEs cpe:2.3:a:sigstore:sigstore:*:*:*:*:*:ruby:*:*
Vendors & Products Sigstore sigstore

Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sigstore
Sigstore sigstore-ruby
Vendors & Products Sigstore
Sigstore sigstore-ruby

Tue, 10 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description sigstore-ruby is a pure Ruby implementation of the sigstore verify command from the sigstore/cosign project. Prior to 0.2.3, Sigstore::Verifier#verify does not propagate the VerificationFailure returned by verify_in_toto when the artifact digest does not match the digest in the in-toto attestation subject. As a result, verification of DSSE bundles containing in-toto statements returns VerificationSuccess regardless of whether the artifact matches the attested subject. This vulnerability is fixed in 0.2.3.
Title sigstore-ruby verifier returns success for DSSE bundles with mismatched in-toto subject digest
Weaknesses CWE-252
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Sigstore Sigstore Sigstore-ruby
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T15:59:03.786Z

Reserved: 2026-03-09T17:41:56.077Z

Link: CVE-2026-31830

cve-icon Vulnrichment

Updated: 2026-03-11T15:53:29.010Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T22:16:21.097

Modified: 2026-03-20T15:19:15.390

Link: CVE-2026-31830

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T03:15:22Z

Weaknesses