Vulnerability DatabaseGHSA-6qhv-4h7r-2g9m

GHSA-6qhv-4h7r-2g9m
Python vulnerability analysis and mitigation

Overview

The vulnerability (CVE-2025-52556/GHSA-6qhv-4h7r-2g9m) affects rfc3161-client, a Python library implementing the Time-Stamp Protocol (TSP), in versions 1.0.2 and earlier. The vulnerability was discovered and disclosed on June 20, 2025, and involves insufficient verification of timestamp response signatures (GitHub Advisory).

Technical details

The vulnerability stems from a flaw in the timestamp response signature verification logic. While the system performs chain verification against the TSR's embedded certificates up to the trusted root(s), it fails to verify the TSR's own signature against the timestamping leaf certificates. The vulnerability has been assigned a Critical severity rating with a CVSS v4.0 base score of 9.3 and is classified as CWE-347 (Improper Verification of Cryptographic Signature) (NVD, GitHub Advisory).

Impact

The vulnerability allows attackers to introduce any TSR signature as long as the embedded leaf chains up to some root TSA, effectively bypassing the intended security measures. This compromises the integrity of the timestamp verification process, potentially allowing for unauthorized modifications or falsification of timestamps (GitHub Advisory).

Mitigation and workarounds

Users are advised to immediately upgrade to rfc3161-client version 1.0.3 or later, which contains the patch for this vulnerability. There are no alternative workarounds available, making the upgrade the only solution (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management