CVE-2026-31839: Striae Integrity Bypass in Digital Confirmation Workflow
Vulnerability ID: CVE-2026-31839
CVSS Score: 8.2
Published: 2026-03-11
Striae versions prior to 3.0.0 suffer from a high-severity integrity bypass vulnerability in the digital confirmation workflow. The application relies on an unauthenticated hash-only validation model for exported forensic packages, allowing attackers to modify evidence and forge validation metadata without detection.
TL;DR
A design flaw in Striae < 3.0.0 allows attackers to modify forensic ZIP packages without detection by recalculating file hashes in the unauthenticated manifest, breaking the chain of custody.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-354
- CVSS Score: 8.2
- Attack Vector: Local
- Impact: High Integrity, High Confidentiality
- Privileges Required: None
- Exploit Status: Proof of Concept
Affected Systems
- Striae digital confirmation workflow
- Striae export/import orchestrator
- FORENSIC_MANIFEST.json parser
-
striae: >= 0.9.22-0, < 3.0.0 (Fixed in:
3.0.0)
Code Analysis
Commit: a4bc6f0
Fix Commit: Implement server-side signing and fail-closed import gates.
Commit: 2543cf8
Fix Commit (Shared Utils): Introduces JSON canonicalization and signature verification utilities.
Mitigation Strategies
- Upgrade Striae to version 3.0.0 or later.
- Reject and re-evaluate any forensic packages lacking a version 2.0 signed manifest.
- Monitor audit logs for failed
manifestSignatureValidevents during import operations.
Remediation Steps:
- Download and install Striae version 3.0.0.
- Update Cloudflare Workers configuration (
compatibility_date: 2026-03-09) to support the required Web Crypto API features. - Provision and securely store
MANIFEST_SIGNING_PRIVATE_KEYon the server-side worker. - Distribute the corresponding
MANIFEST_SIGNING_PUBLIC_KEYto the client application for verification. - Audit historical case imports to identify confirmation packages processed prior to version 3.0.0.
References
Read the full report for CVE-2026-31839 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)