CVE-2026-26275: CWE-354: Improper Validation of Integrity Check Value in junkurihara httpsig-rs
httpsig-hyper is a hyper extension for http message signatures. An issue was discovered in `httpsig-hyper` prior to version 0.0.23 where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, the comparison `if matches!(digest, _expected_digest)` treated `_expected_digest` as a pattern binding rather than a value comparison, resulting in unconditional success of the match expression. As a consequence, digest verification could incorrectly return success even when the computed digest did not match the expected value. Applications relying on Digest verification as part of HTTP message signature validation may therefore fail to detect message body modification. The severity depends on how the library is integrated and whether additional signature validation layers are enforced. This issue has been fixed in `httpsig-hyper` 0.0.23. The fix replaces the incorrect `matches!` usage with proper value comparison and additionally introduces constant-time comparison for digest verification as defense-in-depth. Regression tests have also been added to prevent reintroduction of this issue. Users are strongly advised to upgrade to the patched version. There is no reliable workaround without upgrading. Users who cannot immediately upgrade should avoid relying solely on Digest verification for message integrity and ensure that full HTTP message signature verification is enforced at the application layer.
AI Analysis
Technical Summary
The vulnerability CVE-2026-26275 affects the httpsig-hyper Rust library (httpsig-rs) used for HTTP message signature verification. The root cause is the incorrect use of Rust's matches! macro in digest verification logic. Specifically, the code snippet `if matches!(digest, _expected_digest)` mistakenly treats `_expected_digest` as a pattern binding rather than performing a value equality check. This results in the match expression always evaluating to true, causing the Digest header verification to succeed unconditionally. Consequently, applications relying on this library's Digest verification may accept tampered HTTP message bodies without detection, undermining message integrity. The flaw is classified under CWE-354 (Improper Validation of Integrity Check Value) and CWE-697 (Incorrect Comparison). The fix implemented in version 0.0.23 replaces the matches! macro with a proper equality comparison and introduces constant-time comparison to prevent timing attacks. Regression tests were added to prevent recurrence. The vulnerability is exploitable remotely without authentication or user interaction, impacting the integrity of HTTP message signatures. No known exploits are reported in the wild yet. The severity depends on how the library is integrated and whether additional signature validation layers are in place.
Potential Impact
This vulnerability compromises the integrity of HTTP message signature verification in applications using vulnerable versions of httpsig-hyper. Attackers can modify HTTP message bodies without detection, potentially enabling message forgery, replay attacks, or injection of malicious content. This can lead to unauthorized actions, data corruption, or bypass of security controls relying on message integrity. Since the flaw allows unconditional digest verification success, it undermines trust in signed HTTP communications, affecting APIs, microservices, and distributed systems that depend on httpsig-rs for secure message validation. The impact is particularly severe in environments where Digest verification is the sole integrity check. Although availability and confidentiality are not directly affected, the integrity breach can facilitate further attacks compromising these properties. Organizations worldwide using Rust-based HTTP signature libraries or frameworks that incorporate httpsig-rs are at risk until patched.
Mitigation Recommendations
The primary mitigation is to upgrade httpsig-hyper to version 0.0.23 or later, which contains the fix for this vulnerability. Until upgrading is possible, organizations should avoid relying solely on Digest header verification for message integrity. Instead, enforce full HTTP message signature validation at the application layer, including verification of signature headers beyond the Digest. Implement defense-in-depth by combining multiple integrity checks and monitoring for anomalous message modifications. Review and audit code that depends on httpsig-rs to ensure no insecure assumptions about digest verification exist. Employ constant-time comparison techniques where applicable to prevent timing attacks. Additionally, conduct regression testing after upgrades to confirm the vulnerability is resolved and not reintroduced. Maintain awareness of updates from the vendor and monitor for any emerging exploits targeting this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Japan, South Korea, France, Canada, Australia, Netherlands, Sweden
CVE-2026-26275: CWE-354: Improper Validation of Integrity Check Value in junkurihara httpsig-rs
Description
httpsig-hyper is a hyper extension for http message signatures. An issue was discovered in `httpsig-hyper` prior to version 0.0.23 where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, the comparison `if matches!(digest, _expected_digest)` treated `_expected_digest` as a pattern binding rather than a value comparison, resulting in unconditional success of the match expression. As a consequence, digest verification could incorrectly return success even when the computed digest did not match the expected value. Applications relying on Digest verification as part of HTTP message signature validation may therefore fail to detect message body modification. The severity depends on how the library is integrated and whether additional signature validation layers are enforced. This issue has been fixed in `httpsig-hyper` 0.0.23. The fix replaces the incorrect `matches!` usage with proper value comparison and additionally introduces constant-time comparison for digest verification as defense-in-depth. Regression tests have also been added to prevent reintroduction of this issue. Users are strongly advised to upgrade to the patched version. There is no reliable workaround without upgrading. Users who cannot immediately upgrade should avoid relying solely on Digest verification for message integrity and ensure that full HTTP message signature verification is enforced at the application layer.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2026-26275 affects the httpsig-hyper Rust library (httpsig-rs) used for HTTP message signature verification. The root cause is the incorrect use of Rust's matches! macro in digest verification logic. Specifically, the code snippet `if matches!(digest, _expected_digest)` mistakenly treats `_expected_digest` as a pattern binding rather than performing a value equality check. This results in the match expression always evaluating to true, causing the Digest header verification to succeed unconditionally. Consequently, applications relying on this library's Digest verification may accept tampered HTTP message bodies without detection, undermining message integrity. The flaw is classified under CWE-354 (Improper Validation of Integrity Check Value) and CWE-697 (Incorrect Comparison). The fix implemented in version 0.0.23 replaces the matches! macro with a proper equality comparison and introduces constant-time comparison to prevent timing attacks. Regression tests were added to prevent recurrence. The vulnerability is exploitable remotely without authentication or user interaction, impacting the integrity of HTTP message signatures. No known exploits are reported in the wild yet. The severity depends on how the library is integrated and whether additional signature validation layers are in place.
Potential Impact
This vulnerability compromises the integrity of HTTP message signature verification in applications using vulnerable versions of httpsig-hyper. Attackers can modify HTTP message bodies without detection, potentially enabling message forgery, replay attacks, or injection of malicious content. This can lead to unauthorized actions, data corruption, or bypass of security controls relying on message integrity. Since the flaw allows unconditional digest verification success, it undermines trust in signed HTTP communications, affecting APIs, microservices, and distributed systems that depend on httpsig-rs for secure message validation. The impact is particularly severe in environments where Digest verification is the sole integrity check. Although availability and confidentiality are not directly affected, the integrity breach can facilitate further attacks compromising these properties. Organizations worldwide using Rust-based HTTP signature libraries or frameworks that incorporate httpsig-rs are at risk until patched.
Mitigation Recommendations
The primary mitigation is to upgrade httpsig-hyper to version 0.0.23 or later, which contains the fix for this vulnerability. Until upgrading is possible, organizations should avoid relying solely on Digest header verification for message integrity. Instead, enforce full HTTP message signature validation at the application layer, including verification of signature headers beyond the Digest. Implement defense-in-depth by combining multiple integrity checks and monitoring for anomalous message modifications. Review and audit code that depends on httpsig-rs to ensure no insecure assumptions about digest verification exist. Employ constant-time comparison techniques where applicable to prevent timing attacks. Additionally, conduct regression testing after upgrades to confirm the vulnerability is resolved and not reintroduced. Maintain awareness of updates from the vendor and monitor for any emerging exploits targeting this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-12T17:10:53.413Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699784dbd7880ec89b358466
Added to database: 2/19/2026, 9:47:07 PM
Last enriched: 2/28/2026, 2:46:15 PM
Last updated: 4/3/2026, 8:41:04 PM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.