CVE-2026-26958: CWE-665: Improper Initialization in FiloSottile filippo.io/edwards25519
CVE-2026-26958 is a low-severity vulnerability in the Go cryptographic library filippo. io/edwards25519, specifically affecting versions prior to 1. 1. 1. The flaw arises from improper initialization in the MultiScalarMult method of the Point type, which produces invalid or undefined results when called on points that are not the identity point or are uninitialized. This can lead to incorrect cryptographic computations, including a zero-value point that erroneously compares equal to all other points. The vulnerability is limited to a rarely used advanced API and does not affect common dependencies such as github. com/go-sql-driver/mysql. No known exploits exist in the wild, and the issue has been fixed in version 1. 1.
AI Analysis
Technical Summary
The vulnerability CVE-2026-26958 affects the Go library filippo.io/edwards25519, which implements the edwards25519 elliptic curve for cryptographic primitives. In versions 1.1.0 and earlier, the MultiScalarMult method on the Point type does not properly handle initialization states. When MultiScalarMult is invoked on a Point that is initialized but not the identity point, it returns incorrect results. Worse, if called on an uninitialized Point (the zero value), it returns an invalid point that compares equal to every other point, violating fundamental cryptographic assumptions. This improper initialization (CWE-665) can lead to subtle cryptographic errors, potentially undermining the correctness of higher-level cryptographic protocols relying on this function. However, MultiScalarMult is an advanced, rarely used API, and typical users of the library or indirect users through common dependencies are not affected. The issue was publicly disclosed on February 19, 2026, and fixed in version 1.1.1. The vulnerability does not require authentication or user interaction but has a high attack complexity and limited impact, reflected in a CVSS 4.0 base score of 1.7.
Potential Impact
The impact of this vulnerability is primarily on the integrity of cryptographic operations that rely on the MultiScalarMult function of the filippo.io/edwards25519 library. Incorrect or undefined results can lead to cryptographic failures or incorrect computations, potentially causing higher-level protocols to malfunction or produce invalid outputs. However, since MultiScalarMult is a rarely used advanced API and the vulnerability does not affect common dependencies, the scope of impact is limited. There is no direct impact on confidentiality or availability. No known exploits exist, and the complexity of triggering the flaw is high, reducing the likelihood of widespread exploitation. Organizations using this library in custom cryptographic implementations that utilize MultiScalarMult are at risk of subtle cryptographic errors, which could undermine security guarantees if not patched.
Mitigation Recommendations
Organizations should upgrade filippo.io/edwards25519 to version 1.1.1 or later, where the vulnerability is fixed. Developers using the MultiScalarMult API should audit their code to ensure that Point objects are properly initialized before use, avoiding zero-value or non-identity points as receivers. It is advisable to add explicit checks or assertions to verify the state of Point instances prior to calling MultiScalarMult. For users who do not directly use this API or rely on common dependencies like github.com/go-sql-driver/mysql, no immediate action is required. Security teams should monitor for updates from the vendor and incorporate the patched library version into their software supply chain. Additionally, cryptographic code reviews and testing should be enhanced to detect improper initialization issues in cryptographic primitives.
Affected Countries
United States, Germany, Japan, United Kingdom, France, Canada, Australia, Netherlands, South Korea, Sweden
CVE-2026-26958: CWE-665: Improper Initialization in FiloSottile filippo.io/edwards25519
Description
CVE-2026-26958 is a low-severity vulnerability in the Go cryptographic library filippo. io/edwards25519, specifically affecting versions prior to 1. 1. 1. The flaw arises from improper initialization in the MultiScalarMult method of the Point type, which produces invalid or undefined results when called on points that are not the identity point or are uninitialized. This can lead to incorrect cryptographic computations, including a zero-value point that erroneously compares equal to all other points. The vulnerability is limited to a rarely used advanced API and does not affect common dependencies such as github. com/go-sql-driver/mysql. No known exploits exist in the wild, and the issue has been fixed in version 1. 1.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-26958 affects the Go library filippo.io/edwards25519, which implements the edwards25519 elliptic curve for cryptographic primitives. In versions 1.1.0 and earlier, the MultiScalarMult method on the Point type does not properly handle initialization states. When MultiScalarMult is invoked on a Point that is initialized but not the identity point, it returns incorrect results. Worse, if called on an uninitialized Point (the zero value), it returns an invalid point that compares equal to every other point, violating fundamental cryptographic assumptions. This improper initialization (CWE-665) can lead to subtle cryptographic errors, potentially undermining the correctness of higher-level cryptographic protocols relying on this function. However, MultiScalarMult is an advanced, rarely used API, and typical users of the library or indirect users through common dependencies are not affected. The issue was publicly disclosed on February 19, 2026, and fixed in version 1.1.1. The vulnerability does not require authentication or user interaction but has a high attack complexity and limited impact, reflected in a CVSS 4.0 base score of 1.7.
Potential Impact
The impact of this vulnerability is primarily on the integrity of cryptographic operations that rely on the MultiScalarMult function of the filippo.io/edwards25519 library. Incorrect or undefined results can lead to cryptographic failures or incorrect computations, potentially causing higher-level protocols to malfunction or produce invalid outputs. However, since MultiScalarMult is a rarely used advanced API and the vulnerability does not affect common dependencies, the scope of impact is limited. There is no direct impact on confidentiality or availability. No known exploits exist, and the complexity of triggering the flaw is high, reducing the likelihood of widespread exploitation. Organizations using this library in custom cryptographic implementations that utilize MultiScalarMult are at risk of subtle cryptographic errors, which could undermine security guarantees if not patched.
Mitigation Recommendations
Organizations should upgrade filippo.io/edwards25519 to version 1.1.1 or later, where the vulnerability is fixed. Developers using the MultiScalarMult API should audit their code to ensure that Point objects are properly initialized before use, avoiding zero-value or non-identity points as receivers. It is advisable to add explicit checks or assertions to verify the state of Point instances prior to calling MultiScalarMult. For users who do not directly use this API or rely on common dependencies like github.com/go-sql-driver/mysql, no immediate action is required. Security teams should monitor for updates from the vendor and incorporate the patched library version into their software supply chain. Additionally, cryptographic code reviews and testing should be enhanced to detect improper initialization issues in cryptographic primitives.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-16T22:20:28.611Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699799f2d7880ec89b3a60d2
Added to database: 2/19/2026, 11:17:06 PM
Last enriched: 2/19/2026, 11:31:22 PM
Last updated: 2/20/2026, 12:27:35 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26964: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in windmill-labs windmill
LowCVE-2026-26957: CWE-209: Generation of Error Message Containing Sensitive Information in abhinavxd github.com/abhinavxd/libredesk
MediumCVE-2026-26959: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in Alex4SSB ADB-Explorer
HighCVE-2026-26953: CWE-20: Improper Input Validation in pi-hole web
MediumCVE-2026-2605: Insertion of Sensitive Information into Log File in Tanium TanOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.