NIXPKGS-2026-0758
GitHub issue
published on
Permalink
CVE-2026-33215
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): NONE
- Availability impact (A): LOW
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse accepted
- @LeSuisse published on GitHub
NATS is vulnerable to MQTT hijacking via Client ID
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The nats-server provides an MQTT client interface. Prior to versions 2.11.15 and 2.12.5, Sessions and Messages can by hijacked via MQTT Client ID malfeasance. Versions 2.11.15 and 2.12.5 patch the issue. No known workarounds are available.
References
-
https://github.com/nats-io/nats-server/security/advisories/GHSA-fcjp-h8cc-6879 x_refsource_CONFIRM
-
https://advisories.nats.io/CVE/secnote-2026-06.tx x_refsource_MISC
Affected products
nats-server
- ==< 2.11.15
- ==>= 2.12.0-RC.1, < 2.12.6
Package maintainers
-
@swdunlop Scott W. Dunlop <swdunlop@gmail.com>
-
@derekcollison Derek Collison <derek@nats.io>