Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/sigstore/cosign/v3
  4. ›
  5. CVE-2026-22703

CVE-2026-22703: Cosign verification accepts any valid Rekor entry under certain conditions

January 13, 2026

A Cosign bundle can be crafted to successfully verify an artifact even if the embedded Rekor entry does not reference the artifact’s digest, signature or public key. When verifying a Rekor entry, Cosign verifies the Rekor entry signature, and also compares the artifact’s digest, the user’s public key from either a Fulcio certificate or provided by the user, and the artifact signature to the Rekor entry contents. Without these comparisons, Cosign would accept any response from Rekor as valid. A malicious actor that has compromised a user’s identity or signing key could construct a valid Cosign bundle by including any arbitrary Rekor entry, thus preventing the user from being able to audit the signing event.

This vulnerability only affects users that provide a trusted root via --trusted-root or when fetched automatically from a TUF repository, when no trusted key material is provided via SIGSTORE_REKOR_PUBLIC_KEY. When using the default flag values in Cosign v3 to sign and verify (--use-signing-config=true and --new-bundle-format=true for signing, --new-bundle-format=true for verification), users are unaffected. Cosign v2 users are affected using the default flag values.

This issue had previously been fixed in https://github.com/sigstore/cosign/security/advisories/GHSA-8gw7-4j42-w388 but recent refactoring caused a regression. We have added testing to prevent a future regression.

References

  • github.com/advisories/GHSA-whqx-f9j3-ch6m
  • github.com/sigstore/cosign
  • github.com/sigstore/cosign/commit/6832fba4928c1ad69400235bbc41212de5006176
  • github.com/sigstore/cosign/pull/4623
  • github.com/sigstore/cosign/security/advisories/GHSA-whqx-f9j3-ch6m
  • nvd.nist.gov/vuln/detail/CVE-2026-22703

Code Behaviors & Features

Detect and mitigate CVE-2026-22703 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.0.4

Fixed versions

  • 3.0.4

Solution

Upgrade to version 3.0.4 or above.

Impact 5.5 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-345: Insufficient Verification of Data Authenticity

Source file

go/github.com/sigstore/cosign/v3/CVE-2026-22703.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:35:49 +0000.