Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2884 articles · 109723 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-5263EXPLOITEDPATCHED
wolfssl · wolfssl

URI nameConstraints not enforced in ConfirmNameConstraints()

Description

URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf certificates with URI SAN entries that violate the nameConstraints of the issuing CA, and wolfSSL would accept them as valid.

Affected Products

VendorProductVersions
wolfsslwolfssl0, 5.9.0

References

  • https://github.com/wolfSSL/wolfssl/pull/10048

Related News (1 articles)

Tier C
VulDB4h ago
CVE-2026-5263 | certificateswolfSSL up to 5.9.0 Certificate Chain wolfcrypt/src/asn.c certificate validation
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
5.9.1
CWECWE-295
PublishedApr 9, 2026
Last enriched3h agov2
Trending Score49
Source articles1
Independent1
Info Completeness8/14
Missing: cvss, epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-5477EXP
Prefix-substitution forgery via integer overflow in wolfCrypt CMAC
Trending: 50
CRITICALCVE-2026-5447EXP
Heap buffer overflow in CertFromX509() via AuthorityKeyIdentifier
Trending: 49
CRITICALCVE-2026-5194EXP
wolfSSL ECDSA Certificate Verification
Trending: 49
CRITICALCVE-2026-5501EXP
Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates
Trending: 49
CRITICALCVE-2026-5503EXP
out-of-bounds write in TLSX_EchChangeSNI via attacker-controlled publicName
Trending: 49

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 9, 2026
Actively Exploited
Apr 9, 2026
Patch Available
Apr 9, 2026
Discovered by ZDM
Apr 9, 2026
Updated: severity, affectedVersions, activelyExploited
Apr 10, 2026

Version History

v2
Last enriched 3h ago
v2Tier C3h ago

Updated severity to CRITICAL, added affected version 5.9.0, and noted that no exploit is available.

severityaffectedVersionsactivelyExploited
via VulDB
v110h ago

Initial creation