The vulnerability, CVE-2026-31839, is an integrity bypass in Striae's digital confirmation workflow. The root cause was an insecure method of integrity validation. Confirmation packages were protected only by a SHA256 hash embedded within the package's metadata. An attacker with access to an exported package could alter the confirmation data, recalculate the hash of the modified content, and replace the original hash. The system would then validate the tampered data as authentic because the hash matched the content.
The patch, released in v3.0.0, addresses this by implementing a robust cryptographic signing mechanism. The new workflow involves a server-side component that signs the confirmation data with a private key upon export (signConfirmationData). When the data is imported (importConfirmationData) or manually verified (HashUtility), the system now checks for a valid signature using a public key (verifyConfirmationSignature). This ensures that any modification to the data after it was signed will cause the signature verification to fail, thus preventing the integrity bypass. The vulnerable functions are those that were involved in either creating the insecurely hashed packages (exportConfirmationData) or those that processed them and relied on the insufficient hash check (importConfirmationData, validateConfirmationHash, HashUtility).