GHSA-22w3-693w-x895

Suggest an improvement
Source
https://github.com/advisories/GHSA-22w3-693w-x895
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-22w3-693w-x895/GHSA-22w3-693w-x895.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-22w3-693w-x895
Published
2026-05-06T23:31:27Z
Modified
2026-05-10T08:14:17.037110321Z
Severity
  • 2.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
webauthn-rs-core/webauthn-authenticator-rs: Origin validation mismatch possible when subdomains are allowed
Details

Summary

webauthn-rs-core (Relying Party) and webauthn-authenticator-rs (client) checked that an Origin in CollectedClientData is valid for an RP ID with str::ends_with(), without checking for a dot (.) before the RP ID when allowing subdomains.

This check is flawed, and could allow requests from an attacker-controlled domain such as hermit-crab.example to be accepted for the RP ID crab.example (assuming .example was publicly-registerable TLD) when the RP allows authenticating from a subdomain (disabled by default in webauthn-rs-core and webauthn-rs).

  • In webauthn-rs-core, this only applies when:

    • WebauthnCore::allow_subdomains_origin is true (the default is false), and
    • the attacker could register a domain that ends with the RP ID as a raw string, and,
    • the client does not implement these checks correctly either

    webauthn-rs can set allow_subdomains_origin via WebauthnBuilder::allow_subdomains. Fixing the bug in webauthn-rs-core also fixes it in webauthn-rs.

  • In webauthn-authenticator-rs, the flawed check is in WebauthnAuthenticator::do_registration() and do_authentication().

    A conforming Relying Party implementation would reject such requests, but webauthn-rs-core did not.

    An application can still provide an incorrect origin parameter to webauthn-authenticator-rs, or use lower-level APIs that bypass these checks entirely, and this is by design.

These issues are a violation of WebAuthn Level 3 §13.4.9, §5.1.3 Step 8 and §5.1.4.1 Step 7.

Details

  • webauthn-rs-core/src/core.rs line 1213:

    https://github.com/kanidm/webauthn-rs/blob/197cddf8487a2dbdd5d374e50d80aa1e4682f3ab/webauthn-rs-core/src/core.rs#L1211-L1216

  • webauthn-authenticator-rs/src/lib.rs line 274:

    https://github.com/kanidm/webauthn-rs/blob/197cddf8487a2dbdd5d374e50d80aa1e4682f3ab/webauthn-authenticator-rs/src/lib.rs#L274-L277

  • webauthn-authenticator-rs/src/lib.rs line 335:

    https://github.com/kanidm/webauthn-rs/blob/197cddf8487a2dbdd5d374e50d80aa1e4682f3ab/webauthn-authenticator-rs/src/lib.rs#L335-L338

str::ends_with() performs a raw string suffix match without enforcing a domain label boundary:

Origin | RP ID | Expected result | Result with incorrect ends_with check -- | -- | -- | -- hermit-crab.example | crab.example | rejected | accepted (bug!) auth.crab.example | crab.example | accepted | accepted (subdomain) crab.example | crab.example | accepted | accepted (exact match) hermit-crab.example | auth.crab.example | rejected | rejected auth.crab.example | auth.crab.example | accepted | accepted (exact match)

Fix

When webauthn-rs-core v0.5.5 checks if an Origin is a valid subdomain of an RP ID, it will check that it ends with the RP ID prefixed with a dot (.{rp_id}). webauthn-rs v0.5.5 will be fixed by depending on webauthn-rs-core v0.5.5.

webauthn-authenticator-rs v0.5.5 now uses webauthn-rs-core's checks in WebauthnAuthenticator.

Regression tests for this bug have been added to both libraries.

Impact

With a both a non-conforming client implementation and vulnerable version of webauthn-rs-core configured to allow subdomains (not the default), this bug would allow an attacker at hermit-crab.example to phish a target's credential for the RP ID crab.example by directly proxying a legitimate navigator.credentials.get() request on the attacker's domain.

However, conforming client implementations (ie: all web browsers) will refuse to process WebAuthn requests for an RP ID that does not match the Origin of the current page and is not a related Origin.

In the scenario above with conforming client-side checks, this would force the attacker to change the request's RP ID to hermit-crab.example (the attacker's Origin). This would also change the RP ID hash, and webauthn-rs-core would reject it (per WebAuthn §7.2 Step 15).

Severity

Per WebAuthn §13.4.9:

The Relying Party MUST NOT accept unexpected values of origin, as doing so could allow a malicious website to obtain valid credentials. Although the scope of WebAuthn credentials prevents their use on domains outside the RP ID they were registered for, the Relying Party’s origin validation serves as an additional layer of protection in case a faulty authenticator fails to enforce credential scope.

Unfortunately, the chain needed to exploit this bug makes it difficult to classify with the CVSS framework. Kanidm came up with anywhere between "low" and "high" depending on the approach, and GitHub only provides one CVSS field for everything.

An attacker could easily bypass a correctly-implemented server-side Origin check, if they can convince a target to use their authenticator with an attacker-controlled client device or buggy/malicious client application. FIDO's Security Reference assumes that "the FIDO user device and applications involved in a FIDO operation are trustworthy agents of the user", and violating that limits the protections FIDO can provide, so it would be ridiculous to describe those bypasses as a "high" severity vulnerability.

However, webauthn-rs-core should take reasonable steps to prevent these sorts of issues where it can, especially when they're part of the WebAuthn specification.

Due to the complex preconditions and non-default configuration required to execute a successful attack, and that it is not exploitable in popular web browsers, Kanidm considers this a low severity issue.

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2026-05-06T23:31:27Z",
    "cwe_ids": [
        "CWE-1289"
    ],
    "severity": "LOW",
    "github_reviewed": true
}
References

Affected packages

crates.io / webauthn-rs-core

Package

Name
webauthn-rs-core
View open source insights on deps.dev
Purl
pkg:cargo/webauthn-rs-core

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.5

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-22w3-693w-x895/GHSA-22w3-693w-x895.json"
last_known_affected_version_range
"<= 0.5.4"

crates.io / webauthn-authenticator-rs

Package

Name
webauthn-authenticator-rs
View open source insights on deps.dev
Purl
pkg:cargo/webauthn-authenticator-rs

Affected ranges

Type
SEMVER
Events
Introduced
0.6.0-dev
Fixed
0.6.1-dev

Affected versions

0.*
0.6.0-dev

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-22w3-693w-x895/GHSA-22w3-693w-x895.json"

crates.io / webauthn-rs-core

Package

Name
webauthn-rs-core
View open source insights on deps.dev
Purl
pkg:cargo/webauthn-rs-core

Affected ranges

Type
SEMVER
Events
Introduced
0.6.0-dev
Fixed
0.6.1-dev

Affected versions

0.*
0.6.0-dev

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-22w3-693w-x895/GHSA-22w3-693w-x895.json"

crates.io / webauthn-authenticator-rs

Package

Name
webauthn-authenticator-rs
View open source insights on deps.dev
Purl
pkg:cargo/webauthn-authenticator-rs

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.5

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-22w3-693w-x895/GHSA-22w3-693w-x895.json"
last_known_affected_version_range
"<= 0.5.4"