GHSA-h8cp-697h-8c8p

Suggest an improvement
Source
https://github.com/advisories/GHSA-h8cp-697h-8c8p
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-h8cp-697h-8c8p/GHSA-h8cp-697h-8c8p.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-h8cp-697h-8c8p
Aliases
  • CVE-2025-44005
Published
2025-12-03T17:00:03Z
Modified
2025-12-03T17:27:59.674984Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Step CA Has Authorization Bypass in ACME and SCEP Provisioners
Details

Summary

A security fix is now available for Step CA that resolves a vulnerability affecting deployments configured with ACME and/or SCEP provisioners. All operators running these provisioners should upgrade to the latest release (v0.29.0) immediately.

The issue was discovered and disclosed by a research team during a security review. There is no evidence of active exploitation.

To limit exploitation risk during a coordinated disclosure window, we are withholding detailed technical information for now. A full write-up will be published in several weeks.


Embargo List

If your organization runs Step CA in production and would like advance, embargoed notification of future security updates, visit https://u.step.sm/disclosure to request inclusion on our embargo list.


Acknowledgements

This issue was identified and reported by Stephen Kubik of the Cisco Advanced Security Initiatives Group (ASIG)


Stay safe, and thank you for helping us keep the ecosystem secure.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": null,
    "github_reviewed_at": "2025-12-03T17:00:03Z",
    "severity": "CRITICAL",
    "cwe_ids": [
        "CWE-306"
    ]
}
References

Affected packages

Go / github.com/smallstep/certificates

Package

Name
github.com/smallstep/certificates
View open source insights on deps.dev
Purl
pkg:golang/github.com/smallstep/certificates

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.29.0

Database specific

last_known_affected_version_range

"<= 0.28.4"