CVE-2026-22703 Overview
CVE-2026-22703 is a verification bypass vulnerability in Cosign, a widely-used tool for code signing and transparency for containers and binaries. Prior to versions 2.6.2 and 3.0.4, a Cosign bundle can be crafted to successfully verify an artifact even if the embedded Rekor entry does not reference the artifact's digest, signature, or public key. This insufficient verification of data authenticity (CWE-345) allows attackers to circumvent audit trails and potentially mask malicious signing activities.
Critical Impact
A malicious actor who has compromised a user's identity or signing key could construct a valid Cosign bundle by including any arbitrary Rekor entry, preventing the legitimate user from auditing the signing event and undermining the integrity of the software supply chain.
Affected Products
- Cosign versions prior to 2.6.2
- Cosign versions prior to 3.0.4
- Sigstore Cosign container signing implementations
Discovery Timeline
- 2026-01-10 - CVE-2026-22703 published to NVD
- 2026-01-13 - Last updated in NVD database
Technical Details for CVE-2026-22703
Vulnerability Analysis
This vulnerability stems from an insufficient verification of data authenticity in Cosign's bundle verification process. When verifying a Rekor entry, Cosign is designed to verify the Rekor entry signature and compare the artifact's digest, the user's public key (either from a Fulcio certificate or provided directly), and the artifact signature against the Rekor entry contents.
The flaw lies in the verification logic where these critical comparisons were not being properly enforced. Without these comparisons, Cosign would accept any response from Rekor as valid, regardless of whether the Rekor entry actually corresponded to the artifact being verified. This represents a fundamental break in the chain of trust that Cosign is designed to provide.
The vulnerability requires local access and low privileges to exploit, but allows an attacker with high integrity impact to manipulate the verification process. No user interaction is required to trigger the vulnerable code path.
Root Cause
The root cause is insufficient verification of data authenticity (CWE-345) in the Rekor entry validation logic. The verification routine failed to properly compare:
- The artifact's cryptographic digest against the Rekor entry
- The user's public key against what's recorded in Rekor
- The artifact signature against the Rekor entry contents
This incomplete validation allowed arbitrary Rekor entries to be substituted in place of legitimate ones, breaking the transparency guarantee that Cosign is meant to provide.
Attack Vector
The attack requires local access to the system where Cosign verification is performed. An attacker who has already compromised a user's identity or signing key can exploit this vulnerability by:
- Creating a malicious artifact that needs to appear legitimately signed
- Constructing a Cosign bundle that includes an arbitrary but valid Rekor entry from a previous legitimate signing operation
- Presenting this crafted bundle during verification, which would pass despite the Rekor entry not matching the actual artifact
The vulnerability is particularly concerning in CI/CD pipelines and container deployment workflows where automated signature verification is critical for supply chain security. By exploiting this flaw, an attacker could deploy malicious containers or binaries while avoiding detection in transparency logs.
Detection Methods for CVE-2026-22703
Indicators of Compromise
- Mismatches between artifact digests and corresponding Rekor transparency log entries
- Signing events that cannot be correlated in Rekor when manually audited
- Unexpected or reused Rekor entry timestamps that don't align with actual signing times
- Discrepancies between Fulcio certificates and the public keys recorded in Rekor entries
Detection Strategies
- Implement secondary validation of Rekor entries by querying the Rekor API directly and comparing all fields
- Monitor for Cosign verification operations that succeed without corresponding Rekor log queries
- Audit container and binary deployments by cross-referencing artifact hashes with Rekor transparency logs
- Deploy integrity monitoring on systems running older Cosign versions to detect bundle manipulation
Monitoring Recommendations
- Enable verbose logging for all Cosign verification operations in production environments
- Set up alerts for verification events where Rekor entry metadata doesn't match artifact metadata
- Implement continuous monitoring of transparency log consistency for critical software artifacts
- Review CI/CD pipeline logs for anomalous signing or verification patterns
How to Mitigate CVE-2026-22703
Immediate Actions Required
- Upgrade Cosign to version 2.6.2 or 3.0.4 immediately
- Audit recent artifact verifications to ensure Rekor entries properly match signed artifacts
- Review any containers or binaries verified with vulnerable Cosign versions for signs of tampering
- Temporarily implement manual Rekor verification as a secondary check until patches are deployed
Patch Information
The vulnerability has been patched in Cosign versions 2.6.2 and 3.0.4. The fix ensures that all critical comparisons between the artifact digest, public key, and signature against the Rekor entry contents are properly enforced during verification.
For detailed patch information, see the GitHub Commit and the GitHub Pull Request.
Additional details are available in the GitHub Security Advisory.
Workarounds
- Implement additional validation by querying Rekor directly and manually comparing artifact digests, signatures, and public keys
- Restrict access to systems performing Cosign verification to trusted users only
- Deploy network segmentation to limit potential attacker access to verification infrastructure
- Consider using alternative verification methods until Cosign can be upgraded
# Upgrade Cosign to patched version
# For version 2.x branch:
cosign version # Check current version
# Download and install cosign 2.6.2 or later
# For version 3.x branch:
# Download and install cosign 3.0.4 or later
# Verify the upgrade was successful
cosign version
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

