Home

Description

Gitsign is a keyless Sigstore to signing tool for Git commits with your a GitHub / OIDC identity. From 0.4.0 to before 0.15.0, CertVerifier.Verify() in pkg/git/verifier.go unconditionally dereferences certs[0] after sd.GetCertificates() without checking the slice length. A CMS/PKCS7 signed message with an empty certificate set is a structurally valid DER payload; GetCertificates() returns an empty slice with no error, causing an immediate index-out-of-range panic. On the gitsign --verify code path (the GPG-compatible mode invoked by git verify-commit), the panic is silently recovered by internal/io/streams.go's Wrap() function, which returns nil instead of an error. main.go then exits with code 0, causing exit-code-only verification callers to interpret the failed verification as success. This vulnerability is fixed in 0.15.0.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-15 | Updated 2026-05-15 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

Problem types

CWE-129: Improper Validation of Array Index

CWE-390: Detection of Error Condition Without Action

Product status

>= 0.4.0, < 0.15.0
affected

References

github.com/...itsign/security/advisories/GHSA-7c37-gx6w-8vc5 exploit

github.com/...itsign/security/advisories/GHSA-7c37-gx6w-8vc5

cve.org (CVE-2026-44310)

nvd.nist.gov (CVE-2026-44310)

Download JSON