Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r727-5pf6-47r2 | Elastic Package Registry has Improper Verification of Cryptographic Signature |
Tue, 05 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:elastic:elastic_package_registry:*:*:*:*:*:*:*:* |
Wed, 29 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elastic
Elastic elastic Package Registry |
|
| Vendors & Products |
Elastic
Elastic elastic Package Registry |
Tue, 28 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Verification of Cryptographic Signature (CWE-347) in Elastic Package Registry could allow an attacker positioned to intercept network traffic, or to otherwise influence the contents served to a self-hosted registry, to substitute a tampered package without the integrity check failing closed. | |
| Title | Improper Verification of Cryptographic Signature in Elastic Package Registry Leading to Package Integrity Bypass | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: elastic
Published:
Updated: 2026-04-29T15:10:02.861Z
Reserved: 2026-03-20T10:53:23.100Z
Link: CVE-2026-33467
Updated: 2026-04-29T14:54:58.168Z
Status : Analyzed
Published: 2026-04-28T22:16:48.823
Modified: 2026-05-05T17:55:21.490
Link: CVE-2026-33467
No data.
OpenCVE Enrichment
Updated: 2026-04-29T10:10:18Z
Github GHSA