sigstore CSRF possibility in OIDC authentication during signing
Low severity
GitHub Reviewed
Published
Jan 26, 2026
in
sigstore/sigstore-python
•
Updated Jan 26, 2026
Description
Published to the GitHub Advisory Database
Jan 26, 2026
Reviewed
Jan 26, 2026
Last updated
Jan 26, 2026
Summary
The sigstore-python OAuth authentication flow is susceptible to Cross-Site Request Forgery.
Details
_OAuthSessioncreates a unique "state" and sends it as a parameter in the authentication request but the "state" in the server response seems not not be cross-checked with this value.Fix should be fairly trivial.
Impact
This should be low impact: A man-in-the middle attacker could trick a sigstore-python user into signing something with an identity controlled by the attacker (by returning the response to an authentication request they created). This would be quite confusing but not dangerous.
References