CVE-2026-5194

Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled.
References
Link Resource
https://github.com/wolfSSL/wolfssl/pull/10131 Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*

History

16 Apr 2026, 20:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CPE cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
References () https://github.com/wolfSSL/wolfssl/pull/10131 - () https://github.com/wolfSSL/wolfssl/pull/10131 - Issue Tracking
First Time Wolfssl
Wolfssl wolfssl

09 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-09 20:16

Updated : 2026-04-16 20:37


NVD link : CVE-2026-5194

Mitre link : CVE-2026-5194

CVE.ORG link : CVE-2026-5194


JSON object : View

Products Affected

wolfssl

  • wolfssl
CWE
CWE-295

Improper Certificate Validation