Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/wolfssl/wolfssl/pull/10102 |
|
Wed, 29 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 10 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfssl |
|
| Vendors & Products |
Wolfssl
Wolfssl wolfssl |
Fri, 10 Apr 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wolfSSL's ECCSI signature verifier `wc_VerifyEccsiHash` decodes the `r` and `s` scalars from the signature blob via `mp_read_unsigned_bin` with no check that they lie in `[1, q-1]`. A crafted forged signature could verify against any message for any identity, using only publicly-known constants. | |
| Title | wc_VerifyEccsiHash missing sanity check | |
| Weaknesses | CWE-347 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-04-22T03:55:48.877Z
Reserved: 2026-04-03T07:07:31.067Z
Link: CVE-2026-5466
Updated: 2026-04-10T13:43:31.353Z
Status : Analyzed
Published: 2026-04-10T04:17:16.420
Modified: 2026-04-29T13:49:42.780
Link: CVE-2026-5466
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:26:57Z