Fulcio is a certificate authority for issuing code signing certificates for an OpenID Connect (OIDC) identity. Prior to 1.8.5, Fulcio's metaRegex() function uses unanchored regex, allowing attackers to bypass MetaIssuer URL validation and trigger SSRF to arbitrary internal services. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. This vulnerability is fixed in 1.8.5.
References
| Link | Resource |
|---|---|
| https://github.com/sigstore/fulcio/commit/eaae2f2be56df9dea5f9b439ec81bedae4c0978d | Patch |
| https://github.com/sigstore/fulcio/security/advisories/GHSA-59jp-pj84-45mr | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-12 21:15
Updated : 2026-03-05 13:48
NVD link : CVE-2026-22772
Mitre link : CVE-2026-22772
CVE.ORG link : CVE-2026-22772
JSON object : View
Products Affected
linuxfoundation
- fulcio
CWE
CWE-918
Server-Side Request Forgery (SSRF)
