{"api_version":"1","generated_at":"2026-04-22T15:33:43+00:00","cve":"CVE-2026-27138","urls":{"html":"https://cve.report/CVE-2026-27138","api":"https://cve.report/api/cve/CVE-2026-27138.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-27138","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-27138"},"summary":{"title":"Panic in name constraint checking for malformed certificates in crypto/x509","description":"Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.","state":"PUBLISHED","assigner":"Go","published_at":"2026-03-06 22:16:00","updated_at":"2026-04-21 14:39:28"},"problem_types":["CWE-295","CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"5.9","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"5.9","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"references":[{"url":"https://pkg.go.dev/vuln/GO-2026-4600","name":"https://pkg.go.dev/vuln/GO-2026-4600","refsource":"security@golang.org","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk","name":"https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk","refsource":"security@golang.org","tags":["Release Notes"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://go.dev/cl/752183","name":"https://go.dev/cl/752183","refsource":"security@golang.org","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://go.dev/issue/77953","name":"https://go.dev/issue/77953","refsource":"security@golang.org","tags":["Issue Tracking"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-27138","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27138","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Go standard library","product":"crypto/x509","version":"affected 1.26.0-0 1.26.1 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Jakub Ciolek","lang":"en"}],"nvd_cpes":[{"cve_year":"2026","cve_id":"27138","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"golang","cpe5":"go","cpe6":"1.26.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"27138","cve":"CVE-2026-27138","epss":"0.000210000","percentile":"0.058940000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:40"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2026-27138","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-10T13:34:15.972110Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-10T13:35:19.784Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"collectionURL":"https://pkg.go.dev","defaultStatus":"unaffected","packageName":"crypto/x509","product":"crypto/x509","programRoutines":[{"name":"dnsConstraints.query"},{"name":"Certificate.Verify"}],"vendor":"Go standard library","versions":[{"lessThan":"1.26.1","status":"affected","version":"1.26.0-0","versionType":"semver"}]}],"credits":[{"lang":"en","value":"Jakub Ciolek"}],"descriptions":[{"lang":"en","value":"Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS."}],"problemTypes":[{"descriptions":[{"description":"CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-03-08T05:56:21.000Z","orgId":"1bb62c36-49e3-4200-9d77-64a1400537cc","shortName":"Go"},"references":[{"url":"https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk"},{"url":"https://go.dev/issue/77953"},{"url":"https://go.dev/cl/752183"},{"url":"https://pkg.go.dev/vuln/GO-2026-4600"}],"title":"Panic in name constraint checking for malformed certificates in crypto/x509"}},"cveMetadata":{"assignerOrgId":"1bb62c36-49e3-4200-9d77-64a1400537cc","assignerShortName":"Go","cveId":"CVE-2026-27138","datePublished":"2026-03-06T21:28:14.000Z","dateReserved":"2026-02-17T19:57:28.435Z","dateUpdated":"2026-03-10T13:35:19.784Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-06 22:16:00","lastModifiedDate":"2026-04-21 14:39:28","problem_types":["CWE-295","CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:golang:go:1.26.0:*:*:*:*:*:*:*","matchCriteriaId":"A40FE3CB-0D03-462B-8A19-4DF1920ABE82"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"27138","Ordinal":"1","Title":"Panic in name constraint checking for malformed certificates in ","CVE":"CVE-2026-27138","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"27138","Ordinal":"1","NoteData":"Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.","Type":"Description","Title":"Panic in name constraint checking for malformed certificates in "}]}}}