Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27137: CWE-295: Improper Certificate Validation in Go standard library crypto/x509

0
High
VulnerabilityCVE-2026-27137cvecve-2026-27137cwe-295
Published: Fri Mar 06 2026 (03/06/2026, 21:28:13 UTC)
Source: CVE Database V5
Vendor/Project: Go standard library
Product: crypto/x509

Description

When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:40:44 UTC

Technical Analysis

CVE-2026-27137 is a vulnerability identified in the Go programming language's standard library, specifically within the crypto/x509 package responsible for certificate chain verification. The issue arises when a certificate contains multiple email address constraints that share the same local part but differ in their domain parts. Instead of correctly applying all constraints, the verification process only considers the last constraint, effectively ignoring others. This improper certificate validation (classified under CWE-295) can lead to scenarios where certificates are accepted or rejected incorrectly, undermining the trust model of TLS and other security protocols relying on accurate certificate validation. The vulnerability affects Go version 1.26.0-0 and does not require any privileges or user interaction to exploit, making it accessible to remote attackers. The CVSS score of 7.5 reflects a high severity, primarily due to the potential for denial of service or disruption in services that depend on strict certificate validation. While no public exploits are known, the flaw could be leveraged to bypass email address restrictions embedded in certificates, potentially allowing unauthorized access or causing service interruptions. The vulnerability was published on March 6, 2026, and remains unpatched at the time of this report.

Potential Impact

The improper validation of email address constraints in certificates can lead to multiple impacts for organizations worldwide. Primarily, it can cause denial of service or availability issues in systems that rely on strict certificate validation, as invalid or malicious certificates might be accepted or valid certificates rejected. This could disrupt secure communications, automated certificate-based authentication, and email-related security mechanisms. Attackers might exploit this flaw to bypass email address restrictions, potentially impersonating users or services, leading to unauthorized access or man-in-the-middle attacks. The vulnerability affects any application or service using the affected Go crypto/x509 library version for certificate validation, including web servers, APIs, microservices, and email systems. Given Go's widespread adoption in cloud-native environments, container orchestration, and backend services, the scope of affected systems is broad. The lack of required authentication and user interaction increases the risk of exploitation. Although no known exploits exist yet, the potential for significant disruption and security breaches is high.

Mitigation Recommendations

To mitigate CVE-2026-27137, organizations should first upgrade to a patched version of the Go standard library once available, as this is the most effective solution. In the interim, developers should implement additional certificate validation checks at the application level to ensure all email address constraints in certificates are properly verified, rather than relying solely on the vulnerable crypto/x509 package. Employing external certificate validation tools or libraries that correctly handle multiple email constraints can serve as a temporary workaround. Monitoring and logging certificate validation failures can help detect exploitation attempts. Organizations should also audit their use of Go in critical systems to identify affected components and prioritize remediation. Network-level protections such as strict TLS configurations, certificate pinning, and limiting exposure of vulnerable services can reduce attack surface. Finally, maintaining an incident response plan that includes certificate-related anomalies will improve readiness against potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2026-02-17T19:57:28.434Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69ab4b1fc48b3f10ffddeb07

Added to database: 3/6/2026, 9:46:07 PM

Last enriched: 3/14/2026, 7:40:44 PM

Last updated: 4/20/2026, 5:41:53 PM

Views: 139

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses