Intel

AIKIDO-2026-10492

wolfSSL.wolfssl is vulnerable to Improper Certificate Validation

Improper Certificate ValidationCVE-2026-5263

70

High Risk

This Affects:

c++wolfSSL.wolfssl
0.0.1 - 5.9.0
Fixed in 5.9.1

TL;DR

URI nameConstraints from constrained intermediate CAs are parsed but not enforced during certificate chain verification in wolfcrypt/src/asn.c. A compromised or malicious sub-CA could issue leaf certificates with URI SAN entries that violate the nameConstraints of the issuing CA, and wolfSSL would accept them as valid.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

wolfSSL.wolfssl is vulnerable to Improper Certificate Validation in versions 0.0.1 - 5.9.0.

How to fix this

Upgrade the wolfssl library to the patch version.