Untriaged
Permalink
CVE-2026-33215
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): LOW
NATS is vulnerable to MQTT hijacking via Client ID
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The nats-server provides an MQTT client interface. Prior to versions 2.11.15 and 2.12.5, Sessions and Messages can by hijacked via MQTT Client ID malfeasance. Versions 2.11.15 and 2.12.5 patch the issue. No known workarounds are available.
References
-
https://github.com/nats-io/nats-server/security/advisories/GHSA-fcjp-h8cc-6879 x_refsource_CONFIRM
-
https://advisories.nats.io/CVE/secnote-2026-06.tx x_refsource_MISC
Affected products
nats-server
- ==< 2.11.15
- ==>= 2.12.0-RC.1, < 2.12.6
Package maintainers
-
@derekcollison Derek Collison <derek@nats.io>
-
@swdunlop Scott W. Dunlop <swdunlop@gmail.com>