Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26275: CWE-354: Improper Validation of Integrity Check Value in junkurihara httpsig-rs

0
High
VulnerabilityCVE-2026-26275cvecve-2026-26275cwe-354cwe-697
Published: Thu Feb 19 2026 (02/19/2026, 21:25:37 UTC)
Source: CVE Database V5
Vendor/Project: junkurihara
Product: httpsig-rs

Description

httpsig-hyper is a hyper extension for http message signatures. An issue was discovered in `httpsig-hyper` prior to version 0.0.23 where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, the comparison `if matches!(digest, _expected_digest)` treated `_expected_digest` as a pattern binding rather than a value comparison, resulting in unconditional success of the match expression. As a consequence, digest verification could incorrectly return success even when the computed digest did not match the expected value. Applications relying on Digest verification as part of HTTP message signature validation may therefore fail to detect message body modification. The severity depends on how the library is integrated and whether additional signature validation layers are enforced. This issue has been fixed in `httpsig-hyper` 0.0.23. The fix replaces the incorrect `matches!` usage with proper value comparison and additionally introduces constant-time comparison for digest verification as defense-in-depth. Regression tests have also been added to prevent reintroduction of this issue. Users are strongly advised to upgrade to the patched version. There is no reliable workaround without upgrading. Users who cannot immediately upgrade should avoid relying solely on Digest verification for message integrity and ensure that full HTTP message signature verification is enforced at the application layer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:46:15 UTC

Technical Analysis

The vulnerability CVE-2026-26275 affects the httpsig-hyper Rust library (httpsig-rs) used for HTTP message signature verification. The root cause is the incorrect use of Rust's matches! macro in digest verification logic. Specifically, the code snippet `if matches!(digest, _expected_digest)` mistakenly treats `_expected_digest` as a pattern binding rather than performing a value equality check. This results in the match expression always evaluating to true, causing the Digest header verification to succeed unconditionally. Consequently, applications relying on this library's Digest verification may accept tampered HTTP message bodies without detection, undermining message integrity. The flaw is classified under CWE-354 (Improper Validation of Integrity Check Value) and CWE-697 (Incorrect Comparison). The fix implemented in version 0.0.23 replaces the matches! macro with a proper equality comparison and introduces constant-time comparison to prevent timing attacks. Regression tests were added to prevent recurrence. The vulnerability is exploitable remotely without authentication or user interaction, impacting the integrity of HTTP message signatures. No known exploits are reported in the wild yet. The severity depends on how the library is integrated and whether additional signature validation layers are in place.

Potential Impact

This vulnerability compromises the integrity of HTTP message signature verification in applications using vulnerable versions of httpsig-hyper. Attackers can modify HTTP message bodies without detection, potentially enabling message forgery, replay attacks, or injection of malicious content. This can lead to unauthorized actions, data corruption, or bypass of security controls relying on message integrity. Since the flaw allows unconditional digest verification success, it undermines trust in signed HTTP communications, affecting APIs, microservices, and distributed systems that depend on httpsig-rs for secure message validation. The impact is particularly severe in environments where Digest verification is the sole integrity check. Although availability and confidentiality are not directly affected, the integrity breach can facilitate further attacks compromising these properties. Organizations worldwide using Rust-based HTTP signature libraries or frameworks that incorporate httpsig-rs are at risk until patched.

Mitigation Recommendations

The primary mitigation is to upgrade httpsig-hyper to version 0.0.23 or later, which contains the fix for this vulnerability. Until upgrading is possible, organizations should avoid relying solely on Digest header verification for message integrity. Instead, enforce full HTTP message signature validation at the application layer, including verification of signature headers beyond the Digest. Implement defense-in-depth by combining multiple integrity checks and monitoring for anomalous message modifications. Review and audit code that depends on httpsig-rs to ensure no insecure assumptions about digest verification exist. Employ constant-time comparison techniques where applicable to prevent timing attacks. Additionally, conduct regression testing after upgrades to confirm the vulnerability is resolved and not reintroduced. Maintain awareness of updates from the vendor and monitor for any emerging exploits targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-12T17:10:53.413Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699784dbd7880ec89b358466

Added to database: 2/19/2026, 9:47:07 PM

Last enriched: 2/28/2026, 2:46:15 PM

Last updated: 4/3/2026, 8:41:04 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses