CVE-2025-30215

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-30215
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-30215.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-30215
Aliases
Related
Published
2025-04-16T00:15:19Z
Modified
2025-04-22T16:11:47.025671Z
Summary
[none]
Details

NATS-Server is a High-Performance server for NATS.io, the cloud and edge native messaging system. In versions starting from 2.2.0 but prior to 2.10.27 and 2.11.1, the management of JetStream assets happens with messages in the $JS. subject namespace in the system account; this is partially exposed into regular accounts to allow account holders to manage their assets. Some of the JS API requests were missing access controls, allowing any user with JS management permissions in any account to perform certain administrative actions on any JS asset in any other account. At least one of the unprotected APIs allows for data destruction. None of the affected APIs allow disclosing stream contents. This vulnerability is fixed in v2.11.1 or v2.10.27.

References

Affected packages

Debian:12 / nats-server

Package

Name
nats-server
Purl
pkg:deb/debian/nats-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.9.10-1
2.9.19-1
2.10.1-1
2.10.3-1
2.10.4-1
2.10.7-1
2.10.16-1
2.10.18-1
2.10.24-1
2.10.27-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / nats-server

Package

Name
nats-server
Purl
pkg:deb/debian/nats-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.27-1

Affected versions

2.*

2.9.10-1
2.9.19-1
2.10.1-1
2.10.3-1
2.10.4-1
2.10.7-1
2.10.16-1
2.10.18-1
2.10.24-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}