Description
sigstore-python is a Python tool for generating and verifying Sigstore signatures. Prior to version 4.2.0, the sigstore-python OAuth authentication flow is susceptible to Cross-Site Request Forgery. `_OAuthSession` creates a unique "state" and sends it as a parameter in the authentication request but the "state" in the server response seems not not be cross-checked with this value. Version 4.2.0 contains a patch for the issue.
Published: 2026-01-26
Score: 0 Low
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery in OIDC authentication could let an attacker force a signed payload to appear authentic
Action: Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hm8f-75xx-w2vr sigstore CSRF possibility in OIDC authentication during signing
History

Mon, 02 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation sigstore-python
CPEs cpe:2.3:a:linuxfoundation:sigstore-python:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation sigstore-python

Tue, 27 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Sigstore
Sigstore sigstore-python
Vendors & Products Sigstore
Sigstore sigstore-python

Mon, 26 Jan 2026 22:30:00 +0000

Type Values Removed Values Added
Description sigstore-python is a Python tool for generating and verifying Sigstore signatures. Prior to version 4.2.0, the sigstore-python OAuth authentication flow is susceptible to Cross-Site Request Forgery. `_OAuthSession` creates a unique "state" and sends it as a parameter in the authentication request but the "state" in the server response seems not not be cross-checked with this value. Version 4.2.0 contains a patch for the issue.
Title sigstore has CSRF possibility in OIDC authentication during signing
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N'}


Subscriptions

Linuxfoundation Sigstore-python
Sigstore Sigstore-python
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-27T21:35:14.119Z

Reserved: 2026-01-22T18:19:49.174Z

Link: CVE-2026-24408

cve-icon Vulnrichment

Updated: 2026-01-27T21:35:10.160Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T23:16:08.973

Modified: 2026-03-02T21:19:25.777

Link: CVE-2026-24408

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:45:27Z

Weaknesses