NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Starting in version 2.2.0 and prior to versions 2.11.14 and 2.12.5, a missing sanity check on a WebSockets frame could trigger a server panic in the nats-server. This happens before authentication, and so is exposed to anyone who can connect to the websockets port. Versions 2.11.14 and 2.12.5 contains a fix. A workaround is available. The vulnerability only affects deployments which use WebSockets and which expose the network port to untrusted end-points. If one is able to do so, a defense in depth of restricting either of these will mitigate the attack.
References
| Link | Resource |
|---|---|
| https://advisories.nats.io/CVE/secnote-2026-03.txt | Mitigation Vendor Advisory |
| https://github.com/nats-io/nats-server/security/advisories/GHSA-pq2q-rcw4-3hr6 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-25 20:16
Updated : 2026-03-26 17:13
NVD link : CVE-2026-27889
Mitre link : CVE-2026-27889
CVE.ORG link : CVE-2026-27889
JSON object : View
Products Affected
linuxfoundation
- nats-server
CWE
CWE-190
Integer Overflow or Wraparound
