Vulnerability DatabaseGHSA-77hh-43cm-v8j6

GHSA-77hh-43cm-v8j6
Python vulnerability analysis and mitigation

Overview

A security vulnerability was identified in the TUF (The Update Framework) Python implementation affecting versions 2.0.0 to 3.1.1, specifically in the Metadata API's Targets.get_delegated_role() function. The vulnerability stems from missing input validation in the case of 'succinct delegation', where the function fails to verify if the given delegated_rolename is actually delegated by the Targets (GitHub Advisory).

Technical details

The vulnerability exists in the tuf.api.metadata.Targets.get_delegated_role() function, which is responsible for finding delegation information during the verification process of Metadata objects. When using succinct delegation, the function fails to properly validate whether the provided delegated_role argument is actually delegated by the Targets. This oversight affects the verification process used by Targets.verify_delegate() and Targets.get_verification_result() functions (GitHub Advisory).

Impact

The vulnerability's impact is considered low due to several factors. While it could result in incorrect verification results when using succinct delegation, it cannot affect TUF clients implementing the standard client workflow since the delegated role name is derived from trusted delegating Targets. Additionally, the actual signature verification process remains intact, requiring metadata to be correctly signed by the keys specified in the delegating role (GitHub Advisory).

Mitigation and workarounds

A patch has been released in python-tuf version 3.1.1. Users can update to this version to address the vulnerability. For those unable to update immediately, a workaround exists: tuf.api.metadata users should only call Targets.get_delegated_role(), Targets.verify_delegate(), or Targets.get_verification_result() with delegated_role arguments that are known to be delegated by the Targets in question (TUF Release, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22871HIGH8.7
  • PythonPython
  • guarddog
NoYesJan 13, 2026
GHSA-58pv-8j8x-9vj2HIGH8.6
  • PythonPython
  • jaraco.context
NoYesJan 13, 2026
CVE-2026-22779MEDIUM6.3
  • PythonPython
  • blacksheep
NoYesJan 14, 2026
CVE-2026-21889LOW2.3
  • PythonPython
  • weblate
NoYesJan 14, 2026
CVE-2025-68492LOW2.3
  • PythonPython
  • chainlit
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management