CVE-2026-40070

BSV Ruby SDK is the Ruby SDK for the BSV blockchain. From 0.3.1 to before 0.8.2, BSV::Wallet::WalletClient#acquire_certificate persists certificate records to storage without verifying the certifier's signature over the certificate contents. In acquisition_protocol: 'direct', the caller supplies all certificate fields (including signature:) and the record is written to storage verbatim. In acquisition_protocol: 'issuance', the client POSTs to a certifier URL and writes whatever signature the response body contains, also without verification. An attacker who can reach either API (or who controls a certifier endpoint targeted by the issuance path) can forge identity certificates that subsequently appear authentic to list_certificates and prove_certificate.
Configurations

No configuration.

History

13 Apr 2026, 16:16

Type Values Removed Values Added
References () https://github.com/sgbett/bsv-ruby-sdk/security/advisories/GHSA-hc36-c89j-5f4j - () https://github.com/sgbett/bsv-ruby-sdk/security/advisories/GHSA-hc36-c89j-5f4j -

09 Apr 2026, 18:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 18:17

Updated : 2026-04-13 16:16


NVD link : CVE-2026-40070

Mitre link : CVE-2026-40070

CVE.ORG link : CVE-2026-40070


JSON object : View

Products Affected

No product.

CWE
CWE-347

Improper Verification of Cryptographic Signature