Untriaged
Permalink
CVE-2026-33222
4.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): HIGH
- Availability impact (A): NONE
NATS JetStream has an authorization bypass through its Management API
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, users with JetStream admin API access to restore one stream could restore to other stream names, impacting data which should have been protected against them. Versions 2.11.15 and 2.12.6 contain a fix. As a workaround, if developers have configured users to have limited JetStream restore permissions, temporarily remove those permissions.
References
-
https://github.com/nats-io/nats-server/security/advisories/GHSA-9983-vrx2-fg9c x_refsource_CONFIRM
-
https://advisories.nats.io/CVE/secnote-2026-12.txt x_refsource_MISC
Affected products
nats-server
- ==>= 2.12.0-RC.1, < 2.12.6
- ==< 2.11.15
Package maintainers
-
@derekcollison Derek Collison <derek@nats.io>
-
@swdunlop Scott W. Dunlop <swdunlop@gmail.com>