CVE-2024-21669
Python vulnerability analysis and mitigation

Overview

Hyperledger Aries Cloud Agent Python (ACA-Py) contains a critical vulnerability (CVE-2024-21669) affecting its verification of W3C Format Verifiable Credentials using JSON-LD with Linked Data Proofs (LDP-VCs). The vulnerability was introduced in version 0.7.0 and has been fixed in version 0.10.5. The core issue lies in the verification process where the result of verifying the presentation document.proof was not factored into the final verified value on the presentation record (GitHub Advisory).

Technical details

The vulnerability stems from a flaw in the verification logic where the presentation's document.proof verification status was not included in determining the overall verification result. This could lead to situations where a presentation with invalid proofs would still be marked as verified. The issue has received a CVSS v3.1 base score of 8.8 HIGH from NVD (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and 9.9 CRITICAL from GitHub (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L). The vulnerability is classified under CWE-347 (Improper Verification of Cryptographic Signature) (NVD).

Impact

The vulnerability allows two types of attacks: holders of W3C Format Verifiable Credentials using JSON-LD with Linked Data Proofs can present incorrectly constructed proofs, and malicious verifiers can save and replay a presentation from legitimate holders as their own. This impacts all ACA-Py deployments that rely on W3C Format Verifiable Credentials using JSON-LD with Linked Data Proofs (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.10.5 and is also fixed in version 0.11.0. There are no workarounds available other than upgrading to a patched version of ACA-Py. Users are strongly recommended to upgrade to one of these versions as soon as possible (Release Notes).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-5882-5rx9-xgxpCRITICAL10
  • PythonPython
  • crawl4ai
NoYesJan 16, 2026
GHSA-vx9w-5cx4-9796HIGH8.6
  • PythonPython
  • crawl4ai
NoYesJan 16, 2026
CVE-2026-23535HIGH8
  • PythonPython
  • wlc
NoYesJan 16, 2026
CVE-2026-23490HIGH7.5
  • PythonPython
  • pyasn1
NoYesJan 16, 2026
CVE-2026-23528MEDIUM5.3
  • PythonPython
  • distributed
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management