CVE-2026-26958: CWE-665: Improper Initialization in FiloSottile filippo.io/edwards25519
filippo.io/edwards25519 is a Go library implementing the edwards25519 elliptic curve with APIs for building cryptographic primitives. In versions 1.1.0 and earlier, MultiScalarMult produces invalid results or undefined behavior if the receiver is not the identity point. If (*Point).MultiScalarMult is called on an initialized point that is not the identity point, it returns an incorrect result. If the method is called on an uninitialized point, the behavior is undefined. In particular, if the receiver is the zero value, MultiScalarMult returns an invalid point that compares Equal to every other point. Note that MultiScalarMult is a rarely used, advanced API. For example, users who depend on filippo.io/edwards25519 only through github.com/go-sql-driver/mysql are not affected. This issue has been fixed in version 1.1.1.
AI Analysis
Technical Summary
The vulnerability CVE-2026-26958 affects the Go library filippo.io/edwards25519, which implements the edwards25519 elliptic curve for cryptographic primitives. In versions 1.1.0 and earlier, the MultiScalarMult method on the Point type exhibits improper initialization behavior (CWE-665). When MultiScalarMult is called on a Point receiver that is not the identity point or is uninitialized (such as the zero value), it returns invalid or undefined results. Notably, if the receiver is the zero value, MultiScalarMult returns a point that erroneously compares equal to every other point, violating expected cryptographic properties. This can cause incorrect cryptographic computations, potentially undermining the integrity of cryptographic protocols relying on this function. However, MultiScalarMult is an advanced and rarely used API, so typical users of the library or indirect users through common dependencies like github.com/go-sql-driver/mysql are not affected. The vulnerability does not require authentication or user interaction and is exploitable remotely, but the attack complexity is high due to the need to invoke the specific API incorrectly. The issue was addressed in version 1.1.1 by ensuring proper initialization and validation of the receiver point before performing MultiScalarMult operations. No known exploits have been reported in the wild, and the CVSS 4.0 base score is 1.7, reflecting low severity.
Potential Impact
The primary impact of this vulnerability is the potential for incorrect cryptographic computations when using the MultiScalarMult method on improperly initialized points. This can lead to subtle cryptographic failures, such as invalid signatures or key agreement errors, which may compromise the integrity of cryptographic protocols relying on this library. However, the vulnerability does not directly expose confidential data, allow privilege escalation, or cause denial of service. Given that MultiScalarMult is an advanced API rarely used in typical applications, the scope of affected systems is limited. Organizations that build custom cryptographic solutions using this library and invoke MultiScalarMult without proper initialization risk cryptographic failures that could undermine security guarantees. Indirect users or applications relying on higher-level abstractions are unlikely to be affected. Overall, the impact is low but non-negligible for specialized cryptographic implementations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade filippo.io/edwards25519 to version 1.1.1 or later, where the issue is fixed by enforcing proper initialization of the receiver point in MultiScalarMult. Developers using this library should audit their code to ensure that MultiScalarMult is never called on uninitialized or zero-value Point instances. Implementing explicit checks or constructors that guarantee the receiver point is the identity point or properly initialized before invoking MultiScalarMult can prevent misuse. Additionally, cryptographic code reviews and testing should include validation of point initialization states to detect improper usage. For applications indirectly using this library through dependencies, verify whether those dependencies invoke MultiScalarMult; if not, the risk is minimal. Monitoring for updates and advisories from the library maintainers is recommended to stay informed about any further issues.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, France, Canada, Australia, Netherlands, Sweden
CVE-2026-26958: CWE-665: Improper Initialization in FiloSottile filippo.io/edwards25519
Description
filippo.io/edwards25519 is a Go library implementing the edwards25519 elliptic curve with APIs for building cryptographic primitives. In versions 1.1.0 and earlier, MultiScalarMult produces invalid results or undefined behavior if the receiver is not the identity point. If (*Point).MultiScalarMult is called on an initialized point that is not the identity point, it returns an incorrect result. If the method is called on an uninitialized point, the behavior is undefined. In particular, if the receiver is the zero value, MultiScalarMult returns an invalid point that compares Equal to every other point. Note that MultiScalarMult is a rarely used, advanced API. For example, users who depend on filippo.io/edwards25519 only through github.com/go-sql-driver/mysql are not affected. This issue has been fixed in version 1.1.1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2026-26958 affects the Go library filippo.io/edwards25519, which implements the edwards25519 elliptic curve for cryptographic primitives. In versions 1.1.0 and earlier, the MultiScalarMult method on the Point type exhibits improper initialization behavior (CWE-665). When MultiScalarMult is called on a Point receiver that is not the identity point or is uninitialized (such as the zero value), it returns invalid or undefined results. Notably, if the receiver is the zero value, MultiScalarMult returns a point that erroneously compares equal to every other point, violating expected cryptographic properties. This can cause incorrect cryptographic computations, potentially undermining the integrity of cryptographic protocols relying on this function. However, MultiScalarMult is an advanced and rarely used API, so typical users of the library or indirect users through common dependencies like github.com/go-sql-driver/mysql are not affected. The vulnerability does not require authentication or user interaction and is exploitable remotely, but the attack complexity is high due to the need to invoke the specific API incorrectly. The issue was addressed in version 1.1.1 by ensuring proper initialization and validation of the receiver point before performing MultiScalarMult operations. No known exploits have been reported in the wild, and the CVSS 4.0 base score is 1.7, reflecting low severity.
Potential Impact
The primary impact of this vulnerability is the potential for incorrect cryptographic computations when using the MultiScalarMult method on improperly initialized points. This can lead to subtle cryptographic failures, such as invalid signatures or key agreement errors, which may compromise the integrity of cryptographic protocols relying on this library. However, the vulnerability does not directly expose confidential data, allow privilege escalation, or cause denial of service. Given that MultiScalarMult is an advanced API rarely used in typical applications, the scope of affected systems is limited. Organizations that build custom cryptographic solutions using this library and invoke MultiScalarMult without proper initialization risk cryptographic failures that could undermine security guarantees. Indirect users or applications relying on higher-level abstractions are unlikely to be affected. Overall, the impact is low but non-negligible for specialized cryptographic implementations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade filippo.io/edwards25519 to version 1.1.1 or later, where the issue is fixed by enforcing proper initialization of the receiver point in MultiScalarMult. Developers using this library should audit their code to ensure that MultiScalarMult is never called on uninitialized or zero-value Point instances. Implementing explicit checks or constructors that guarantee the receiver point is the identity point or properly initialized before invoking MultiScalarMult can prevent misuse. Additionally, cryptographic code reviews and testing should include validation of point initialization states to detect improper usage. For applications indirectly using this library through dependencies, verify whether those dependencies invoke MultiScalarMult; if not, the risk is minimal. Monitoring for updates and advisories from the library maintainers is recommended to stay informed about any further issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-16T22:20:28.611Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699799f2d7880ec89b3a60d2
Added to database: 2/19/2026, 11:17:06 PM
Last enriched: 2/28/2026, 2:47:27 PM
Last updated: 4/5/2026, 3:49:17 AM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.