Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pq2q-rcw4-3hr6 | NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation nats-server |
|
| CPEs | cpe:2.3:a:linuxfoundation:nats-server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation nats-server |
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nats
Nats nats Server |
|
| Vendors & Products |
Nats
Nats nats Server |
Thu, 26 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1286 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 25 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Starting in version 2.2.0 and prior to versions 2.11.14 and 2.12.5, a missing sanity check on a WebSockets frame could trigger a server panic in the nats-server. This happens before authentication, and so is exposed to anyone who can connect to the websockets port. Versions 2.11.14 and 2.12.5 contains a fix. A workaround is available. The vulnerability only affects deployments which use WebSockets and which expose the network port to untrusted end-points. If one is able to do so, a defense in depth of restricting either of these will mitigate the attack. | |
| Title | NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-25T20:06:31.897Z
Reserved: 2026-02-24T15:19:29.716Z
Link: CVE-2026-27889
Updated: 2026-03-25T20:06:28.024Z
Status : Analyzed
Published: 2026-03-25T20:16:27.210
Modified: 2026-03-26T17:13:16.140
Link: CVE-2026-27889
OpenCVE Enrichment
Updated: 2026-03-27T09:30:16Z
Github GHSA