DEBIAN-CVE-2026-33246

Source
https://security-tracker.debian.org/tracker/CVE-2026-33246
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33246.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-33246
Upstream
  • CVE-2026-33246
Published
2026-03-25T20:16:33.010Z
Modified
2026-03-27T10:02:59.219571Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The nats-server offers a Nats-Request-Info: message header, providing information about a request. This is supposed to provide enough information to allow for account/user identification, such that NATS clients could make their own decisions on how to trust a message, provided that they trust the nats-server as a broker. A leafnode connecting to a nats-server is not fully trusted unless the system account is bridged too. Thus identity claims should not have propagated unchecked. Prior to versions 2.11.15 and 2.12.6, NATS clients relying upon the Nats-Request-Info: header could be spoofed. This does not directly affect the nats-server itself, but the CVSS Confidentiality and Integrity scores are based upon what a hypothetical client might choose to do with this NATS header. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available.

References

Affected packages

Debian:12 / nats-server

Package

Name
nats-server
Purl
pkg:deb/debian/nats-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.9.10-1
2.9.19-1
2.10.1-1
2.10.3-1
2.10.4-1
2.10.7-1
2.10.16-1
2.10.18-1
2.10.24-1
2.10.27-1
2.12.4-1
2.12.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33246.json"

Debian:13 / nats-server

Package

Name
nats-server
Purl
pkg:deb/debian/nats-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.10.27-1
2.12.4-1
2.12.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33246.json"

Debian:14 / nats-server

Package

Name
nats-server
Purl
pkg:deb/debian/nats-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.10.27-1
2.12.4-1
2.12.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33246.json"