Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-31839

Striae has a hash validation utility vulnerability
Back to all
CVE

CVE-2026-31839

Striae has a hash validation utility vulnerability

Summary

A high-severity integrity bypass vulnerability existed in Striae's digital confirmation workflow prior to v3.0.0. Hash-only validation trusted manifest hash fields that could be modified together with package content, allowing tampered confirmation packages to pass integrity checks.

Impact

Confirmation package integrity could be bypassed because both content and hash values were mutable in the same trust boundary. An attacker with access to an exported package could alter confirmation data and recompute hashes so hash-only checks still passed.

This affects users relying on digital confirmations as an immutability and forensic chain-of-custody control.

Patches

Patched in v3.0.0.

Upgrade to:

  • v3.0.0 or later

Security behavior added in v3.0.0:

  • Server-issued asymmetric signatures for forensic manifests
  • Canonical payload signature verification during import and manual hash verification
  • Fail-closed behavior when signature metadata is missing or invalid
  • Signature/key provenance support for audit-related workflows

Workarounds

There is no full cryptographic workaround equivalent to upgrading.

Temporary mitigations:

  • Treat hash-only validation as a tamper indicator, not proof of immutability
  • Restrict package exchange to trusted authenticated internal channels
  • Require out-of-band reviewer attestation for sensitive confirmation workflows
  • Pause imports from untrusted sources until upgraded

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.2
-
3.1
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
C
H
U
0
-
3.1
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
C
H
U
-

Related Resources

No items found.

References

https://github.com/striae-org/striae/security/advisories/GHSA-mmf8-487q-p45m, https://nvd.nist.gov/vuln/detail/CVE-2026-31839, https://github.com/striae-org/striae, https://github.com/striae-org/striae/releases/tag/v3.0.0

Severity

8.2

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
8.2
EPSS Probability
0.00018%
EPSS Percentile
0.04899%
Introduced Version
0.9.22-0
Fix Available
3.0.0

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading