Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26958: CWE-665: Improper Initialization in FiloSottile filippo.io/edwards25519

0
Low
VulnerabilityCVE-2026-26958cvecve-2026-26958cwe-665
Published: Thu Feb 19 2026 (02/19/2026, 23:01:26 UTC)
Source: CVE Database V5
Vendor/Project: FiloSottile
Product: filippo.io/edwards25519

Description

CVE-2026-26958 is a low-severity vulnerability in the Go cryptographic library filippo. io/edwards25519, specifically affecting versions prior to 1. 1. 1. The flaw arises from improper initialization in the MultiScalarMult method of the Point type, which produces invalid or undefined results when called on points that are not the identity point or are uninitialized. This can lead to incorrect cryptographic computations, including a zero-value point that erroneously compares equal to all other points. The vulnerability is limited to a rarely used advanced API and does not affect common dependencies such as github. com/go-sql-driver/mysql. No known exploits exist in the wild, and the issue has been fixed in version 1. 1.

AI-Powered Analysis

AILast updated: 02/19/2026, 23:31:22 UTC

Technical Analysis

The vulnerability CVE-2026-26958 affects the Go library filippo.io/edwards25519, which implements the edwards25519 elliptic curve for cryptographic primitives. In versions 1.1.0 and earlier, the MultiScalarMult method on the Point type does not properly handle initialization states. When MultiScalarMult is invoked on a Point that is initialized but not the identity point, it returns incorrect results. Worse, if called on an uninitialized Point (the zero value), it returns an invalid point that compares equal to every other point, violating fundamental cryptographic assumptions. This improper initialization (CWE-665) can lead to subtle cryptographic errors, potentially undermining the correctness of higher-level cryptographic protocols relying on this function. However, MultiScalarMult is an advanced, rarely used API, and typical users of the library or indirect users through common dependencies are not affected. The issue was publicly disclosed on February 19, 2026, and fixed in version 1.1.1. The vulnerability does not require authentication or user interaction but has a high attack complexity and limited impact, reflected in a CVSS 4.0 base score of 1.7.

Potential Impact

The impact of this vulnerability is primarily on the integrity of cryptographic operations that rely on the MultiScalarMult function of the filippo.io/edwards25519 library. Incorrect or undefined results can lead to cryptographic failures or incorrect computations, potentially causing higher-level protocols to malfunction or produce invalid outputs. However, since MultiScalarMult is a rarely used advanced API and the vulnerability does not affect common dependencies, the scope of impact is limited. There is no direct impact on confidentiality or availability. No known exploits exist, and the complexity of triggering the flaw is high, reducing the likelihood of widespread exploitation. Organizations using this library in custom cryptographic implementations that utilize MultiScalarMult are at risk of subtle cryptographic errors, which could undermine security guarantees if not patched.

Mitigation Recommendations

Organizations should upgrade filippo.io/edwards25519 to version 1.1.1 or later, where the vulnerability is fixed. Developers using the MultiScalarMult API should audit their code to ensure that Point objects are properly initialized before use, avoiding zero-value or non-identity points as receivers. It is advisable to add explicit checks or assertions to verify the state of Point instances prior to calling MultiScalarMult. For users who do not directly use this API or rely on common dependencies like github.com/go-sql-driver/mysql, no immediate action is required. Security teams should monitor for updates from the vendor and incorporate the patched library version into their software supply chain. Additionally, cryptographic code reviews and testing should be enhanced to detect improper initialization issues in cryptographic primitives.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-16T22:20:28.611Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699799f2d7880ec89b3a60d2

Added to database: 2/19/2026, 11:17:06 PM

Last enriched: 2/19/2026, 11:31:22 PM

Last updated: 2/20/2026, 12:27:35 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats