Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3211 articles · 105663 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-33810EXPLOITEDPATCHED
go standard library · crypto/x509

Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509

Description

When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

Affected Products

VendorProductVersions
go standard librarycrypto/x5091.26.0-0, 1.26.1

References

  • https://go.dev/cl/763763
  • https://go.dev/issue/78332
  • https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU
  • https://pkg.go.dev/vuln/GO-2026-4866

Related News (1 articles)

Tier C
VulDB5h ago
CVE-2026-33810 | crypto-x509 up to 1.26.1 on Go Certificate Chain certificate validation
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
1.26.2
PublishedApr 8, 2026
Last enriched4h agov2
Tags
CVE-2026-33810
Trending Score49
Source articles1
Independent1
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-32289EXP
JsBraceDepth Context Tracking Bugs (XSS) in html/template
Trending: 46
HIGHCVE-2026-32288EXP
Unbounded allocation for old GNU sparse in archive/tar
Trending: 46
HIGHCVE-2026-32283EXP
Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls
Trending: 46
HIGHCVE-2026-32281EXP
Inefficient policy validation in crypto/x509
Trending: 46
CRITICALCVE-2026-32282
TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix
Trending: 30

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 8, 2026
Actively Exploited
Apr 8, 2026
Patch Available
Apr 8, 2026
Discovered by ZDM
Apr 8, 2026
Updated: severity, affectedVersions, activelyExploited, tags
Apr 8, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated severity to CRITICAL, added affected version 1.26.1, and noted that the vulnerability is actively exploited.

severityaffectedVersionsactivelyExploitedtags
via VulDB
v18h ago

Initial creation