Description
When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.
Published: 2026-04-08
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Apply Patch
AI Analysis

Impact

The bug lies in Go's crypto/x509 implementation of name constraint enforcement during certificate chain verification. When a certificate chain includes excluded DNS constraints, the constraints are not correctly applied to wildcard DNS SAN entries that differ in case from the constraint. This logic flaw allows an otherwise trusted chain to satisfy the excludedSubtrees rule, effectively bypassing the intended restriction. The weakness maps to CWE‑1289 – improper constraint application – and CWE‑295, and results in an attacker gaining unauthorized access by presenting a certificate chain that would normally be rejected.

Affected Systems

All instances of the Go standard library’s crypto/x509 package are affected. The flaw impacts any application that validates certificate chains against a root CA supplied via VerifyOptions.Roots CertPool or the system certificate pool. No specific version range was provided in the advisory, so any Go runtime using the vulnerable logic is at risk.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity, while the EPSS score of less than 1 % suggests a low probability of widespread exploitation at present. The vulnerability is not listed in CISA’s KEV catalog, yet it remains a concern for applications that rely on strict name constraint enforcement for internal security controls. Attackers can exploit this flaw by crafting a certificate chain that appears valid under Go’s verification logic but actually violates name constraints, thereby gaining authentication bypass. The most likely attack vector is remote, through network connections that trigger TLS handshakes or other certificate evaluations by Go applications.

Generated by OpenCVE AI on April 18, 2026 at 17:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Go runtime to a version that includes the crypto/x509 patch.
  • Rebuild and redeploy all Go applications to use the updated binary.
  • Ensure that any third‑party services or containers using older Go runtimes are also rebuilt to reference the patched Go binary.

Generated by OpenCVE AI on April 18, 2026 at 17:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
References

Sun, 19 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
References

Fri, 17 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Golang
Golang go
Weaknesses CWE-295
CPEs cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
Vendors & Products Golang
Golang go

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-295

Tue, 14 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1289
References
Metrics threat_severity

None

threat_severity

Important


Mon, 13 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Go Standard Library
Go Standard Library crypto/x509
Vendors & Products Go Standard Library
Go Standard Library crypto/x509

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-295

Wed, 08 Apr 2026 01:45:00 +0000

Type Values Removed Values Added
Description When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.
Title Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509
References

Subscriptions

Go Standard Library Crypto/x509
Golang Go
cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-04-20T17:23:21.823Z

Reserved: 2026-03-23T20:35:32.814Z

Link: CVE-2026-33810

cve-icon Vulnrichment

Updated: 2026-04-19T22:08:53.727Z

cve-icon NVD

Status : Modified

Published: 2026-04-08T02:16:03.950

Modified: 2026-04-20T18:16:26.813

Link: CVE-2026-33810

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-08T01:06:56Z

Links: CVE-2026-33810 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:30:05Z

Weaknesses