Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26958: CWE-665: Improper Initialization in FiloSottile filippo.io/edwards25519

0
Low
VulnerabilityCVE-2026-26958cvecve-2026-26958cwe-665
Published: Thu Feb 19 2026 (02/19/2026, 23:01:26 UTC)
Source: CVE Database V5
Vendor/Project: FiloSottile
Product: filippo.io/edwards25519

Description

filippo.io/edwards25519 is a Go library implementing the edwards25519 elliptic curve with APIs for building cryptographic primitives. In versions 1.1.0 and earlier, MultiScalarMult produces invalid results or undefined behavior if the receiver is not the identity point. If (*Point).MultiScalarMult is called on an initialized point that is not the identity point, it returns an incorrect result. If the method is called on an uninitialized point, the behavior is undefined. In particular, if the receiver is the zero value, MultiScalarMult returns an invalid point that compares Equal to every other point. Note that MultiScalarMult is a rarely used, advanced API. For example, users who depend on filippo.io/edwards25519 only through github.com/go-sql-driver/mysql are not affected. This issue has been fixed in version 1.1.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:47:27 UTC

Technical Analysis

The vulnerability CVE-2026-26958 affects the Go library filippo.io/edwards25519, which implements the edwards25519 elliptic curve for cryptographic primitives. In versions 1.1.0 and earlier, the MultiScalarMult method on the Point type exhibits improper initialization behavior (CWE-665). When MultiScalarMult is called on a Point receiver that is not the identity point or is uninitialized (such as the zero value), it returns invalid or undefined results. Notably, if the receiver is the zero value, MultiScalarMult returns a point that erroneously compares equal to every other point, violating expected cryptographic properties. This can cause incorrect cryptographic computations, potentially undermining the integrity of cryptographic protocols relying on this function. However, MultiScalarMult is an advanced and rarely used API, so typical users of the library or indirect users through common dependencies like github.com/go-sql-driver/mysql are not affected. The vulnerability does not require authentication or user interaction and is exploitable remotely, but the attack complexity is high due to the need to invoke the specific API incorrectly. The issue was addressed in version 1.1.1 by ensuring proper initialization and validation of the receiver point before performing MultiScalarMult operations. No known exploits have been reported in the wild, and the CVSS 4.0 base score is 1.7, reflecting low severity.

Potential Impact

The primary impact of this vulnerability is the potential for incorrect cryptographic computations when using the MultiScalarMult method on improperly initialized points. This can lead to subtle cryptographic failures, such as invalid signatures or key agreement errors, which may compromise the integrity of cryptographic protocols relying on this library. However, the vulnerability does not directly expose confidential data, allow privilege escalation, or cause denial of service. Given that MultiScalarMult is an advanced API rarely used in typical applications, the scope of affected systems is limited. Organizations that build custom cryptographic solutions using this library and invoke MultiScalarMult without proper initialization risk cryptographic failures that could undermine security guarantees. Indirect users or applications relying on higher-level abstractions are unlikely to be affected. Overall, the impact is low but non-negligible for specialized cryptographic implementations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade filippo.io/edwards25519 to version 1.1.1 or later, where the issue is fixed by enforcing proper initialization of the receiver point in MultiScalarMult. Developers using this library should audit their code to ensure that MultiScalarMult is never called on uninitialized or zero-value Point instances. Implementing explicit checks or constructors that guarantee the receiver point is the identity point or properly initialized before invoking MultiScalarMult can prevent misuse. Additionally, cryptographic code reviews and testing should include validation of point initialization states to detect improper usage. For applications indirectly using this library through dependencies, verify whether those dependencies invoke MultiScalarMult; if not, the risk is minimal. Monitoring for updates and advisories from the library maintainers is recommended to stay informed about any further issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-16T22:20:28.611Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699799f2d7880ec89b3a60d2

Added to database: 2/19/2026, 11:17:06 PM

Last enriched: 2/28/2026, 2:47:27 PM

Last updated: 4/6/2026, 4:48:32 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses