EUVD-2025-201293

| CVE-2025-66506 HIGH
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 16:35 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 16:35 euvd
EUVD-2025-201293
Patch Released
Mar 15, 2026 - 16:35 nvd
Patch available
CVE Published
Dec 04, 2025 - 22:15 nvd
HIGH 7.5

Description

Fulcio is a free-to-use certificate authority for issuing code signing certificates for an OpenID Connect (OIDC) identity. Prior to 1.8.3, function identity.extractIssuerURL splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request with an (invalid) OIDC identity token in the payload containing many period characters, a call to extractIssuerURL incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This vulnerability is fixed in 1.8.3.

Analysis

A security vulnerability in Fulcio (CVSS 7.5). High severity vulnerability requiring prompt remediation. Vendor patch is available.

Technical Context

Vulnerability type not specified by vendor. CVSS 7.5 indicates high severity. Affects Fulcio.

Affected Products

['Fulcio']

Remediation

Apply the vendor-supplied patch immediately.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Vendor Status

Ubuntu

Priority: Medium
golang-github-sigstore-fulcio
Release Status Version
jammy DNE -
noble DNE -
questing needs-triage -
upstream needs-triage -
plucky ignored end of life, was needs-triage

Debian

Bug #1122059
golang-github-sigstore-fulcio
Release Status Fixed Version Urgency
trixie vulnerable 1.6.5-1 -
forky, sid vulnerable 1.7.1-1 -
(unstable) fixed (unfixed) -

Share

EUVD-2025-201293 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy