Vulnerability Description
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Sigstore Timestamp Authority | < 2.0.3 |
Related Weaknesses (CWE)
References
- https://github.com/sigstore/timestamp-authority/commit/0cae34e197d685a14904e0badPatch
- https://github.com/sigstore/timestamp-authority/security/advisories/GHSA-4qg8-fjVendor Advisory
FAQ
What is CVE-2025-66564?
CVE-2025-66564 is a vulnerability with a CVSS score of 7.5 (HIGH). Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (whic...
How severe is CVE-2025-66564?
CVE-2025-66564 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-66564?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Sigstore Timestamp Authority.