CVE-2026-27138 — Improper Certificate Validation in Standard Library Crypto X509
Severity
5.9MEDIUMNVD
EPSS
0.0%
top 94.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 6
Latest updateMar 10
Description
Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6
Affected Packages1 packages
🔴Vulnerability Details
4GHSA▶
GHSA-ph5j-38mg-j6hp: Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constr↗2026-03-07
OSV▶
CVE-2026-27138: Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constr↗2026-03-06
📋Vendor Advisories
3Red Hat
▶
Debian▶
CVE-2026-27138: golang-1.15 - Certificate verification can panic when a certificate in the chain has an empty ...↗2026