Certificate Chain Verification Issue in Go Programming Language
CVE-2026-33810
7.5HIGH
What is CVE-2026-33810?
A vulnerability in the Go programming language arises when validating certificate chains that contain excluded DNS constraints. The issue manifests as incorrect application of these constraints to wildcard DNS Subject Alternative Names (SANs) when there is a case mismatch between the wildcard and the constraints. This flaw specifically affects the validation of otherwise trusted certificate chains, which are issued by a root Certificate Authority (CA) included in the specified CertPool or the system certificate pool.
Affected Version(s)
crypto/x509 1.26.0-0 < 1.26.2
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Riyas from Saintgits College of Engineering
k1rnt
@1seal
