RustSec logo

HistoryEditJSON (OSV)

RUSTSEC-2026-0099

Name constraints were accepted for certificates asserting a wildcard name

Reported
Issued
Package
rustls-webpki (crates.io)
Type
Vulnerability
Keywords
#name-constraints #x509
Aliases
Patched
  • >=0.103.12, <0.104.0-alpha.1
  • >=0.104.0-alpha.6

Description

Permitted subtree name constraints for DNS names were accepted for certificates asserting a wildcard name.

This was incorrect because, given a name constraint of accept.example.com, *.example.com could feasibly allow a name of reject.example.com which is outside the constraint. This is very similar to CVE-2025-61727.

Since name constraints are restrictions on otherwise properly-issued certificates, this bug is reachable only after signature verification and requires misissuance to exploit.

This vulnerability is identified as GHSA-xgp8-3hg3-c2mh. Thank you to @1seal for the report.

Advisory available under CC0-1.0 license.