CVE-2026-0810
Published: 26 January 2026
Summary
CVE-2026-0810 is a high-severity Incorrect Calculation of Multi-Byte String Length (CWE-135) vulnerability in Gitoxidelabs Gix-Date. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local exploitation of the string/UTF-8 invariant violation produces application crashes (DoS via exploitation) and data corruption (stored data manipulation).
NVD Description
A flaw was found in gix-date. The `gix_date::parse::TimeBuf::as_str` function can generate strings containing invalid non-UTF8 characters. This issue violates the internal safety invariants of the `TimeBuf` component, leading to undefined behavior when these malformed strings are subsequently processed. This could…
more
potentially result in application instability or other unforeseen consequences.
Deeper analysisAI
CVE-2026-0810, published on 2026-01-26, is a vulnerability in the gix-date Rust crate, which is part of the gitoxide project. The flaw resides in the `gix_date::parse::TimeBuf::as_str` function, which can produce strings containing invalid non-UTF8 characters. This violates the internal safety invariants of the TimeBuf component, potentially causing undefined behavior when the malformed strings are processed further. Such behavior could lead to application instability or other unforeseen consequences. The issue carries a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) and is associated with CWE-135 (incorrect calculation of multi-byte string length) and CWE-682 (incorrect calculation).
Exploitation requires local access, low attack complexity, and low privileges, with no user interaction needed and an unchanged impact scope. A local attacker with basic privileges could trigger the vulnerable function, achieving high impacts on integrity and availability—such as corrupting data or crashing applications that rely on gix-date for date parsing—while confidentiality remains unaffected.
Advisories provide mitigation guidance, including patches for affected versions of gix-date. Security practitioners should consult Red Hat's CVE page (https://access.redhat.com/security/cve/CVE-2026-0810), the related Bugzilla entry (https://bugzilla.redhat.com/show_bug.cgi?id=2427057), the gitoxide GitHub issue (https://github.com/GitoxideLabs/gitoxide/issues/2305), and the RustSec advisory (https://rustsec.org/advisories/RUSTSEC-2025-0140.html) for updated crate versions and remediation steps. The crate page on crates.io (https://crates.io/crates/gix-date) offers details on releases.
Details
- CWE(s)