CVE-2026-26275: CWE-354: Improper Validation of Integrity Check Value in junkurihara httpsig-rs
httpsig-hyper is a hyper extension for http message signatures. An issue was discovered in `httpsig-hyper` prior to version 0.0.23 where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, the comparison `if matches!(digest, _expected_digest)` treated `_expected_digest` as a pattern binding rather than a value comparison, resulting in unconditional success of the match expression. As a consequence, digest verification could incorrectly return success even when the computed digest did not match the expected value. Applications relying on Digest verification as part of HTTP message signature validation may therefore fail to detect message body modification. The severity depends on how the library is integrated and whether additional signature validation layers are enforced. This issue has been fixed in `httpsig-hyper` 0.0.23. The fix replaces the incorrect `matches!` usage with proper value comparison and additionally introduces constant-time comparison for digest verification as defense-in-depth. Regression tests have also been added to prevent reintroduction of this issue. Users are strongly advised to upgrade to the patched version. There is no reliable workaround without upgrading. Users who cannot immediately upgrade should avoid relying solely on Digest verification for message integrity and ensure that full HTTP message signature verification is enforced at the application layer.
AI Analysis
Technical Summary
The vulnerability CVE-2026-26275 affects the httpsig-rs library's httpsig-hyper extension, which implements HTTP message signature verification. The root cause is the incorrect use of Rust's matches! macro in digest verification logic prior to version 0.0.23. Specifically, the code snippet `if matches!(digest, _expected_digest)` mistakenly treats `_expected_digest` as a pattern binding rather than performing a value equality check. This logic flaw causes the digest verification to unconditionally succeed, even when the computed digest does not match the expected digest value. As a result, applications relying on this digest verification step may fail to detect tampering or modification of HTTP message bodies, compromising message integrity. The vulnerability is classified under CWE-354 (Improper Validation of Integrity Check Value) and CWE-697 (Incorrect Comparison). The fix introduced in version 0.0.23 replaces the matches! macro usage with a proper value comparison and adds a constant-time comparison function to mitigate timing attacks, enhancing defense-in-depth. Regression tests were also added to prevent recurrence. The vulnerability can be exploited remotely without authentication or user interaction, making it a significant risk for any system using vulnerable versions of httpsig-rs for HTTP message signature validation. No known exploits are currently reported in the wild. Users are strongly advised to upgrade to version 0.0.23 or later. If immediate upgrade is not possible, relying solely on Digest verification should be avoided, and full HTTP message signature validation should be enforced at the application layer to mitigate risk.
Potential Impact
This vulnerability undermines the integrity assurance of HTTP message signatures by allowing digest verification to falsely succeed. Attackers capable of intercepting or modifying HTTP traffic can alter message bodies without detection, potentially injecting malicious content, altering commands, or corrupting data. This can lead to unauthorized actions, data corruption, or bypass of security controls relying on message integrity. Since the flaw requires no authentication and can be exploited remotely, it poses a high risk to any system using affected versions of httpsig-rs for critical HTTP message validation. The impact is particularly severe for applications that rely solely on Digest header verification without additional signature validation layers. While availability and confidentiality are not directly impacted, the integrity compromise can facilitate further attacks or unauthorized access. Organizations using this library in web services, APIs, or microservices architectures are at risk of message tampering attacks that could disrupt business operations or lead to data breaches.
Mitigation Recommendations
The primary mitigation is to upgrade the httpsig-rs library to version 0.0.23 or later, which contains the fix for this vulnerability. This upgrade replaces the incorrect matches! macro usage with proper value and constant-time comparisons, restoring correct digest verification. For organizations unable to upgrade immediately, it is critical to avoid relying solely on Digest header verification for message integrity. Instead, enforce full HTTP message signature verification at the application layer, ensuring that all signature components are validated correctly. Implement additional integrity checks or cryptographic protections where possible. Conduct thorough code reviews and testing to verify that message signature validation is robust and not bypassable. Monitor network traffic for signs of message tampering or anomalies. Finally, apply regression testing to prevent reintroduction of similar logic errors in future updates.
Affected Countries
United States, Germany, United Kingdom, Japan, South Korea, France, Canada, Australia, Netherlands, Sweden
CVE-2026-26275: CWE-354: Improper Validation of Integrity Check Value in junkurihara httpsig-rs
Description
httpsig-hyper is a hyper extension for http message signatures. An issue was discovered in `httpsig-hyper` prior to version 0.0.23 where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, the comparison `if matches!(digest, _expected_digest)` treated `_expected_digest` as a pattern binding rather than a value comparison, resulting in unconditional success of the match expression. As a consequence, digest verification could incorrectly return success even when the computed digest did not match the expected value. Applications relying on Digest verification as part of HTTP message signature validation may therefore fail to detect message body modification. The severity depends on how the library is integrated and whether additional signature validation layers are enforced. This issue has been fixed in `httpsig-hyper` 0.0.23. The fix replaces the incorrect `matches!` usage with proper value comparison and additionally introduces constant-time comparison for digest verification as defense-in-depth. Regression tests have also been added to prevent reintroduction of this issue. Users are strongly advised to upgrade to the patched version. There is no reliable workaround without upgrading. Users who cannot immediately upgrade should avoid relying solely on Digest verification for message integrity and ensure that full HTTP message signature verification is enforced at the application layer.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-26275 affects the httpsig-rs library's httpsig-hyper extension, which implements HTTP message signature verification. The root cause is the incorrect use of Rust's matches! macro in digest verification logic prior to version 0.0.23. Specifically, the code snippet `if matches!(digest, _expected_digest)` mistakenly treats `_expected_digest` as a pattern binding rather than performing a value equality check. This logic flaw causes the digest verification to unconditionally succeed, even when the computed digest does not match the expected digest value. As a result, applications relying on this digest verification step may fail to detect tampering or modification of HTTP message bodies, compromising message integrity. The vulnerability is classified under CWE-354 (Improper Validation of Integrity Check Value) and CWE-697 (Incorrect Comparison). The fix introduced in version 0.0.23 replaces the matches! macro usage with a proper value comparison and adds a constant-time comparison function to mitigate timing attacks, enhancing defense-in-depth. Regression tests were also added to prevent recurrence. The vulnerability can be exploited remotely without authentication or user interaction, making it a significant risk for any system using vulnerable versions of httpsig-rs for HTTP message signature validation. No known exploits are currently reported in the wild. Users are strongly advised to upgrade to version 0.0.23 or later. If immediate upgrade is not possible, relying solely on Digest verification should be avoided, and full HTTP message signature validation should be enforced at the application layer to mitigate risk.
Potential Impact
This vulnerability undermines the integrity assurance of HTTP message signatures by allowing digest verification to falsely succeed. Attackers capable of intercepting or modifying HTTP traffic can alter message bodies without detection, potentially injecting malicious content, altering commands, or corrupting data. This can lead to unauthorized actions, data corruption, or bypass of security controls relying on message integrity. Since the flaw requires no authentication and can be exploited remotely, it poses a high risk to any system using affected versions of httpsig-rs for critical HTTP message validation. The impact is particularly severe for applications that rely solely on Digest header verification without additional signature validation layers. While availability and confidentiality are not directly impacted, the integrity compromise can facilitate further attacks or unauthorized access. Organizations using this library in web services, APIs, or microservices architectures are at risk of message tampering attacks that could disrupt business operations or lead to data breaches.
Mitigation Recommendations
The primary mitigation is to upgrade the httpsig-rs library to version 0.0.23 or later, which contains the fix for this vulnerability. This upgrade replaces the incorrect matches! macro usage with proper value and constant-time comparisons, restoring correct digest verification. For organizations unable to upgrade immediately, it is critical to avoid relying solely on Digest header verification for message integrity. Instead, enforce full HTTP message signature verification at the application layer, ensuring that all signature components are validated correctly. Implement additional integrity checks or cryptographic protections where possible. Conduct thorough code reviews and testing to verify that message signature validation is robust and not bypassable. Monitor network traffic for signs of message tampering or anomalies. Finally, apply regression testing to prevent reintroduction of similar logic errors in future updates.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-12T17:10:53.413Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699784dbd7880ec89b358466
Added to database: 2/19/2026, 9:47:07 PM
Last enriched: 2/19/2026, 10:01:54 PM
Last updated: 2/20/2026, 9:52:38 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2858: Out-of-Bounds Read in wren-lang wren
MediumCVE-2026-27120: CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in vapor leaf-kit
MediumCVE-2026-27118: CWE-346: Origin Validation Error in sveltejs kit
MediumCVE-2026-27112: CWE-863: Incorrect Authorization in akuity kargo
CriticalCVE-2026-27111: CWE-862: Missing Authorization in akuity kargo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.