Back to list

bsv-sdk and bsv-wallet persist unverified certifier signatures in acquire_certificate (direct and issuance paths) — CVE-2026-40070

GitHub · GitHub · CVE-2026-40070

ID
CVE-2026-40070
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
high
CVSS
8.1
EPSS
0.00011

Summary

# Unverified certifier signatures persisted by `acquire_certificate` ## Affected packages Both `bsv-sdk` and `bsv-wallet` are published from the [sgbett/bsv-ruby-sdk](https://github.com/sgbett/bsv-ruby-sdk) repository. The vulnerable code lives in `lib/bsv/wallet_interface/wallet_client.rb`, which is **physically shipped inside both gems** (the `bsv-wallet.gemspec` `files` list bundles the entire…

Product

rubygems: bsv-sdk | rubygems: bsv-wallet

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories