Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.opensearch.plugin/opensearch-security
  4. ›
  5. GHSA-x5hg-x4gv-j98m

GHSA-x5hg-x4gv-j98m: OpenSearch has ineffective TLS certificate hostname verification

May 7, 2026

A regression was introduced in OpenSearch 2.18.0 that caused the plugins.security.ssl.transport.enforce_hostname_verification setting to be ineffective. When this setting was enabled, OpenSearch did not verify that the hostname in a connecting node’s TLS certificate matched the hostname of the connection. This could allow a node with a valid certificate (signed by the cluster’s trusted CA) but an incorrect hostname SAN to join the cluster.

References

  • github.com/advisories/GHSA-x5hg-x4gv-j98m
  • github.com/opensearch-project/security
  • github.com/opensearch-project/security/security/advisories/GHSA-x5hg-x4gv-j98m

Code Behaviors & Features

Detect and mitigate GHSA-x5hg-x4gv-j98m with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.18.0 before 2.19.4.0, all versions starting from 3.0.0 before 3.3.0.0

Fixed versions

  • 2.19.4.0
  • 3.3.0.0

Solution

Upgrade to versions 2.19.4.0, 3.3.0.0 or above.

Impact 2.2 LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-295: Improper Certificate Validation

Source file

maven/org.opensearch.plugin/opensearch-security/GHSA-x5hg-x4gv-j98m.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:20:36 +0000.