Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pwx7-fx9r-hr4h | NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation nats-server |
|
| CPEs | cpe:2.3:a:linuxfoundation:nats-server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation nats-server |
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nats
Nats nats Server |
|
| Vendors & Products |
Nats
Nats nats Server |
Thu, 26 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-807 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 25 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, the NATS message header `Nats-Request-Info:` is supposed to be a guarantee of identity by the NATS server, but the stripping of this header from inbound messages was not fully effective. An attacker with valid credentials for any regular client interface could thus spoof their identity to services which rely upon this header. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available. | |
| Title | NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing | |
| Weaknesses | CWE-290 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-26T17:51:23.590Z
Reserved: 2026-03-17T23:23:58.315Z
Link: CVE-2026-33223
Updated: 2026-03-26T17:51:19.770Z
Status : Analyzed
Published: 2026-03-25T21:16:47.397
Modified: 2026-03-26T17:18:04.750
Link: CVE-2026-33223
OpenCVE Enrichment
Updated: 2026-03-26T12:09:36Z
Github GHSA