{"api_version":"1","generated_at":"2026-05-13T03:11:56+00:00","cve":"CVE-2020-26290","urls":{"html":"https://cve.report/CVE-2020-26290","api":"https://cve.report/api/cve/CVE-2020-26290.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-26290","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-26290"},"summary":{"title":"CVE-2020-26290","description":"Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references).","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2020-12-28 20:15:00","updated_at":"2020-12-30 15:12:00"},"problem_types":["CWE-347"],"metrics":[],"references":[{"url":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md","name":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md","refsource":"MISC","tags":["Not Applicable","Third Party Advisory"],"title":"xml-roundtrip-validator/unstable-directives.md at master · mattermost/xml-roundtrip-validator · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5","name":"https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Critical security issues in XML encoding · Advisory · dexidp/dex · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/dexidp/dex/releases/tag/v2.27.0","name":"https://github.com/dexidp/dex/releases/tag/v2.27.0","refsource":"MISC","tags":["Third Party Advisory"],"title":"Release v2.27.0 · dexidp/dex · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8","name":"https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"Merge pull request from GHSA-m9hp-7r99-94h5 · dexidp/dex@324b1c8 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md","name":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md","refsource":"MISC","tags":["Not Applicable","Third Party Advisory"],"title":"xml-roundtrip-validator/unstable-attributes.md at master · mattermost/xml-roundtrip-validator · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/","name":"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/","refsource":"MISC","tags":["Not Applicable","Third Party Advisory"],"title":"Coordinated disclosure of XML round-trip vulnerabilities in Go library","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7","name":"https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7","refsource":"MISC","tags":["Not Applicable","Third Party Advisory"],"title":"Signature Validation Bypass · Advisory · russellhaering/goxmldsig · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md","name":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md","refsource":"MISC","tags":["Not Applicable","Third Party Advisory"],"title":"xml-roundtrip-validator/unstable-elements.md at master · mattermost/xml-roundtrip-validator · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-26290","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26290","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"26290","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxfoundation","cpe5":"dex","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26290","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linuxfoundation","cpe5":"dex","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2020-26290","STATE":"PUBLIC","TITLE":"Critical security issues in XML encoding in Dex"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"dex","version":{"version_data":[{"version_value":"< 2.27.0"}]}}]},"vendor_name":"dexidp"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references)."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.3,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-347: Improper Verification of Cryptographic Signature"}]}]},"references":{"reference_data":[{"name":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md","refsource":"MISC","url":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md"},{"name":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md","refsource":"MISC","url":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-elements.md"},{"name":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md","refsource":"MISC","url":"https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md"},{"name":"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/","refsource":"MISC","url":"https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/"},{"name":"https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5","refsource":"CONFIRM","url":"https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5"},{"name":"https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7","refsource":"MISC","url":"https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7"},{"name":"https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8","refsource":"MISC","url":"https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8"},{"name":"https://github.com/dexidp/dex/releases/tag/v2.27.0","refsource":"MISC","url":"https://github.com/dexidp/dex/releases/tag/v2.27.0"}]},"source":{"advisory":"GHSA-m9hp-7r99-94h5","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2020-12-28 20:15:00","lastModifiedDate":"2020-12-30 15:12:00","problem_types":["CWE-347"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.6,"baseSeverity":"CRITICAL"},"exploitabilityScore":2.8,"impactScore":6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:linuxfoundation:dex:*:*:*:*:*:*:*:*","versionEndExcluding":"2.27.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"26290","Ordinal":"187712","Title":"CVE-2020-26290","CVE":"CVE-2020-26290","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"26290","Ordinal":"1","NoteData":"Dex is a federated OpenID Connect provider written in Go. In Dex before version 2.27.0 there is a critical set of vulnerabilities which impacts users leveraging the SAML connector. The vulnerabilities enables potential signature bypass due to issues with XML encoding in the underlying Go library. The vulnerabilities have been addressed in version 2.27.0 by using the xml-roundtrip-validator from Mattermost (see related references).","Type":"Description","Title":null},{"CveYear":"2020","CveId":"26290","Ordinal":"2","NoteData":"2020-12-28","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"26290","Ordinal":"3","NoteData":"2020-12-28","Type":"Other","Title":"Modified"}]}}}