CVE-2026-22772: Unanchored Trust in Sigstore Fulcio
Jan 13, 2026·6 min read·2 visits
Executive Summary (TL;DR)
Fulcio uses regular expressions to validate trusted OIDC providers via 'MetaIssuers'. The generated regexes were missing start and end anchors ('^' and '$'). This allows an attacker to embed a trusted domain string anywhere in a malicious URL (e.g., as a query parameter) to bypass validation and force Fulcio to connect to arbitrary internal or external hosts.
A classic regex implementation failure in Sigstore Fulcio allows attackers to bypass OIDC issuer whitelists, leading to Blind Server-Side Request Forgery (SSRF).
Official Patches
Fix Analysis (1)
Technical Appendix
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:NAffected Systems
Affected Versions Detail
| Product | Affected Versions | Fixed Version |
|---|---|---|
Sigstore Fulcio Sigstore | < 1.8.5 | 1.8.5 |
| Attribute | Detail |
|---|---|
| CVE ID | CVE-2026-22772 |
| CWE ID | CWE-918 |
| CVSS Score | 5.8 (Medium) |
| Attack Vector | Network |
| Impact | Blind SSRF / Information Disclosure |
| Exploit Status | PoC Available (Theoretical) |
MITRE ATT&CK Mapping
The application sends a request to a server that matches a regular expression, but the regular expression is not anchored, allowing the request to be sent to an arbitrary server if the trusted pattern appears anywhere in the URL.
Known Exploits & Detection
Vulnerability Timeline
Subscribe to updates
Get the latest CVE analysis reports delivered to your inbox.