Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-33246
March 25, 2026
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The nats-server offers a "Nats-Request-Info:" message header, providing information about a request. This is supposed to provide enough information to allow for account/user identification, such that NATS clients could make their own decisions on how to trust a message, provided that they trust the nats-server as a broker. A leafnode connecting to a nats-server is not fully trusted unless the system account is bridged too. Thus identity claims should not have propagated unchecked. Prior to versions 2.11.15 and 2.12.6, NATS clients relying upon the Nats-Request-Info: header could be spoofed. This does not directly affect the nats-server itself, but the CVSS Confidentiality and Integrity scores are based upon what a hypothetical client might choose to do with this NATS header. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available.
Affected Packages
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.0.0-RC14.0.20190604014547-ed1901c79292 <v2.11.15
Fix Suggestion:
Update to version v2.11.15
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.0.0-RC14.0.20190604014547-ed1901c79292 <v2.11.15
Fix Suggestion:
Update to version v2.11.15
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.0.0-RC14.0.20190604014547-ed1901c79292 <v2.11.15
Fix Suggestion:
Update to version v2.11.15
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.0.0-RC14.0.20190604014547-ed1901c79292 <v2.11.15
Fix Suggestion:
Update to version v2.11.15
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.0.0-RC14.0.20190604014547-ed1901c79292 <v2.11.15
Fix Suggestion:
Update to version v2.11.15
github.com/nats-io/nats-server/v2 (GO):
Affected version(s) >=v2.0.0-RC14.0.20190604014547-ed1901c79292 <v2.11.15
Fix Suggestion:
Update to version v2.11.15
Do you need more information?
Contact Us
CVSS v4
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
LOW
Subsequent System Integrity
LOW
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Authentication Bypass by Spoofing
Improper Authentication
EPSS
Base Score:
0.02