theinfosecnews

CVE-2026-40070

Published April 9, 2026 · Updated April 10, 2026

8.1CVSS
high

What This Means

CVE-2026-40070 affects the BSV Ruby SDK, specifically versions 0.3.1 to before 0.8.2, allowing an attacker to forge identity certificates. The vulnerability arises because the SDK does not verify the certifier's signature when persisting certificate records, enabling malicious actors to store fraudulent certificates that can appear valid. To mitigate this risk, upgrade to version 0.8.2 or later and ensure the integrity of certification processes by implementing signature verification.

Official Description+

BSV Ruby SDK is the Ruby SDK for the BSV blockchain. From 0.3.1 to before 0.8.2, BSV::Wallet::WalletClient#acquire_certificate persists certificate records to storage without verifying the certifier's signature over the certificate contents. In acquisition_protocol: 'direct', the caller supplies all certificate fields (including signature:) and the record is written to storage verbatim. In acquisition_protocol: 'issuance', the client POSTs to a certifier URL and writes whatever signature the response body contains, also without verification. An attacker who can reach either API (or who controls a certifier endpoint targeted by the issuance path) can forge identity certificates that subsequently appear authentic to list_certificates and prove_certificate.

Recommended Actions

  1. Check if your systems use any of the affected products listed above.
  2. Apply vendor patches immediately if available.
  3. Monitor vendor advisories for updates and additional mitigations.
  4. Review logs for indicators of compromise related to CVE-2026-40070.

Related Coverage