Authorization Bypass in rfc3161-client Python Library by Trail of Bits
CVE-2026-33753

6.2MEDIUM

Key Information:

Vendor
CVE Published:
8 April 2026

What is CVE-2026-33753?

The rfc3161-client Python library, which implements the Time-Stamp Protocol, is susceptible to an authorization bypass flaw prior to version 1.0.6. This vulnerability enables attackers to impersonate a legitimate TimeStamping Authority (TSA) through clever manipulation of certificate validation logic. By exploiting a logic flaw in the extraction of the leaf certificate from an unordered PKCS#7 bag, an attacker can craft a spoofed certificate that meets the target common_name and Extended Key Usage (EKU) requirements. As a result, the library erroneously verifies the spoofed certificate against the intended authorization rules while still validating the cryptographic signature against a trusted TSA. This flaw compromises the integrity of TSA authorization, allowing potential misuse of the timestamping functionality.

Affected Version(s)

rfc3161-client < 1.0.6

References

CVSS V3.1

Score:
6.2
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.