Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2894 articles · 109731 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-5501EXPLOITED
wolfssl · wolfssl

Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates

Description

wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which the leaf's signature is not checked, if the attacker supplies an untrusted intermediate with Basic Constraints `CA:FALSE` that is legitimately signed by a trusted root. An attacker who obtains any leaf certificate from a trusted CA (e.g. a free DV cert from Let's Encrypt) can forge a certificate for any subject name with any public key and arbitrary signature bytes, and the function returns `WOLFSSL_SUCCESS` / `X509_V_OK`. The native wolfSSL TLS handshake path (`ProcessPeerCerts`) is not susceptible and the issue is limited to applications using the OpenSSL compatibility API directly, which would include integrations of wolfSSL into nginx and haproxy.

Affected Products

VendorProductVersions
wolfsslwolfssl0, 5.9.0

References

  • https://github.com/wolfSSL/wolfssl/pull/10102

Related News (1 articles)

Tier C
VulDB6h ago
CVE-2026-5501 | wolfSSL up to 5.9.0 OpenSSL Compatibility API wolfSSL_X509_verify_cert certificate validation
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-295
PublishedApr 10, 2026
Last enriched5h agov2
Trending Score49
Source articles1
Independent1
Info Completeness7/14
Missing: cvss, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-5447EXP
Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier
Trending: 49
CRITICALCVE-2026-5194EXP
wolfSSL ECDSA Certificate Verification
Trending: 49
CRITICALCVE-2026-5477EXP
Prefix-substitution forgery via integer overflow in wolfCrypt CMAC
Trending: 49
CRITICALCVE-2026-5503EXP
out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName
Trending: 49
CRITICALCVE-2026-5188EXP
Integer underflow in X.509 SAN parsing in wolfSSL
Trending: 49

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 10, 2026
Discovered by ZDM
Apr 10, 2026
Actively Exploited
Apr 10, 2026
Updated: severity, affectedVersions, activelyExploited
Apr 10, 2026

Version History

v2
Last enriched 5h ago
v2Tier C5h ago

Updated severity to CRITICAL, added affected version 5.9.0, and marked the vulnerability as actively exploited.

severityaffectedVersionsactivelyExploited
via VulDB
v15h ago

Initial creation