Striae is a firearms examiner's comparison companion. A high-severity integrity bypass vulnerability existed in Striae's digital confirmation workflow prior to v3.0.0. Hash-only validation trusted manifest hash fields that could be modified together with package content, allowing tampered confirmation packages to pass integrity checks. This vulnerability is fixed in 3.0.0.
References
| Link | Resource |
|---|---|
| https://github.com/striae-org/striae/releases/tag/v3.0.0 | Release Notes |
| https://github.com/striae-org/striae/security/advisories/GHSA-mmf8-487q-p45m | Vendor Advisory |
Configurations
History
20 Mar 2026, 16:56
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Striae striae
Striae |
|
| CPE | cpe:2.3:a:striae:striae:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/striae-org/striae/releases/tag/v3.0.0 - Release Notes | |
| References | () https://github.com/striae-org/striae/security/advisories/GHSA-mmf8-487q-p45m - Vendor Advisory |
11 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 17:16
Updated : 2026-03-20 16:56
NVD link : CVE-2026-31839
Mitre link : CVE-2026-31839
CVE.ORG link : CVE-2026-31839
JSON object : View
Products Affected
striae
- striae
CWE
CWE-354
Improper Validation of Integrity Check Value
