{"id":"CVE-2026-33810","summary":"Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509","details":"When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.","aliases":["BIT-golang-2026-33810","GO-2026-4866"],"modified":"2026-05-15T04:14:39.456670291Z","published":"2026-04-08T01:06:56.546Z","related":["CGA-3wxx-h77j-whj2","SUSE-SU-2026:1320-1","SUSE-SU-2026:1580-1","SUSE-SU-2026:21356-1","openSUSE-SU-2026:10525-1","openSUSE-SU-2026:20571-1","openSUSE-SU-2026:20703-1"],"database_specific":{"cna_assigner":"Go","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33810.json","unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"introduced":"1.26.0-0"},{"fixed":"1.26.2"}]}]},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2026/04/19/4"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2026/04/20/1"},{"type":"WEB","url":"https://go.dev/cl/763763"},{"type":"WEB","url":"https://go.dev/issue/78332"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"},{"type":"WEB","url":"https://pkg.go.dev"},{"type":"WEB","url":"https://pkg.go.dev/vuln/GO-2026-4866"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33810.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33810"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}