CVE-2026-21434: CWE-770: Allocation of Resources Without Limits or Throttling in quic-go webtransport-go
webtransport-go is an implementation of the WebTransport protocol. From 0.3.0 to 0.9.0, an attacker can cause excessive memory consumption in webtransport-go's session implementation by sending a WT_CLOSE_SESSION capsule containing an excessively large Application Error Message. The implementation does not enforce the draft-mandated limit of 1024 bytes on this field, allowing a peer to send an arbitrarily large message payload that is fully read and stored in memory. This allows an attacker to consume an arbitrary amount of memory. The attacker must transmit the full payload to achieve the memory consumption, but the lack of any upper bound makes large-scale attacks feasible given sufficient bandwidth. This vulnerability is fixed in 0.10.0.
AI Analysis
Technical Summary
CVE-2026-21434 affects the webtransport-go library, an implementation of the WebTransport protocol used for multiplexed, bidirectional communication over QUIC. The vulnerability arises from improper resource management in the session handling code, specifically in processing the WT_CLOSE_SESSION capsule. According to the WebTransport draft specification, the Application Error Message field in this capsule must not exceed 1024 bytes. However, versions 0.3.0 through 0.9.0 of webtransport-go do not enforce this limit, allowing an attacker to send a WT_CLOSE_SESSION capsule containing an arbitrarily large payload. The implementation reads and stores this payload fully in memory without any throttling or limits, leading to uncontrolled memory allocation. This flaw enables an attacker to consume excessive memory on the target system, potentially causing denial-of-service conditions by exhausting available resources. Exploitation requires no privileges or user interaction and can be performed remotely by sending crafted network packets. The vulnerability has a CVSS v3.1 score of 5.3, reflecting a medium severity level primarily due to its impact on availability without affecting confidentiality or integrity. The issue was publicly disclosed on February 12, 2026, and fixed in webtransport-go version 0.10.0. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability poses a risk of denial-of-service attacks against services relying on vulnerable versions of webtransport-go. Since WebTransport is designed for low-latency, multiplexed communication over QUIC, it may be used in real-time applications such as media streaming, remote collaboration, or IoT device communication. An attacker exploiting this flaw could cause service disruptions by exhausting server memory, leading to degraded performance or crashes. This can impact business continuity, user experience, and potentially lead to financial losses or reputational damage. Organizations in sectors with high reliance on real-time web communication, such as telecommunications, media, and critical infrastructure, may be particularly affected. Additionally, the lack of authentication or user interaction requirements lowers the barrier for attackers to exploit this remotely. However, the absence of known exploits and the medium CVSS score suggest the threat is moderate but should not be underestimated given the potential for large-scale attacks if bandwidth permits.
Mitigation Recommendations
European organizations should immediately upgrade all instances of webtransport-go to version 0.10.0 or later, where the vulnerability is fixed by enforcing the 1024-byte limit on the Application Error Message field. Until upgrades can be applied, network-level mitigations should be implemented, such as rate limiting and deep packet inspection to detect and block unusually large WT_CLOSE_SESSION capsules or abnormal WebTransport traffic patterns. Deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to identify and drop oversized payloads can reduce attack surface. Monitoring memory usage and establishing alerting for abnormal resource consumption on servers running webtransport-go is recommended to detect potential exploitation attempts early. Additionally, organizations should review their exposure of WebTransport services to untrusted networks and consider restricting access where feasible. Regular vulnerability scanning and patch management processes should be enforced to prevent exploitation of this and similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2026-21434: CWE-770: Allocation of Resources Without Limits or Throttling in quic-go webtransport-go
Description
webtransport-go is an implementation of the WebTransport protocol. From 0.3.0 to 0.9.0, an attacker can cause excessive memory consumption in webtransport-go's session implementation by sending a WT_CLOSE_SESSION capsule containing an excessively large Application Error Message. The implementation does not enforce the draft-mandated limit of 1024 bytes on this field, allowing a peer to send an arbitrarily large message payload that is fully read and stored in memory. This allows an attacker to consume an arbitrary amount of memory. The attacker must transmit the full payload to achieve the memory consumption, but the lack of any upper bound makes large-scale attacks feasible given sufficient bandwidth. This vulnerability is fixed in 0.10.0.
AI-Powered Analysis
Technical Analysis
CVE-2026-21434 affects the webtransport-go library, an implementation of the WebTransport protocol used for multiplexed, bidirectional communication over QUIC. The vulnerability arises from improper resource management in the session handling code, specifically in processing the WT_CLOSE_SESSION capsule. According to the WebTransport draft specification, the Application Error Message field in this capsule must not exceed 1024 bytes. However, versions 0.3.0 through 0.9.0 of webtransport-go do not enforce this limit, allowing an attacker to send a WT_CLOSE_SESSION capsule containing an arbitrarily large payload. The implementation reads and stores this payload fully in memory without any throttling or limits, leading to uncontrolled memory allocation. This flaw enables an attacker to consume excessive memory on the target system, potentially causing denial-of-service conditions by exhausting available resources. Exploitation requires no privileges or user interaction and can be performed remotely by sending crafted network packets. The vulnerability has a CVSS v3.1 score of 5.3, reflecting a medium severity level primarily due to its impact on availability without affecting confidentiality or integrity. The issue was publicly disclosed on February 12, 2026, and fixed in webtransport-go version 0.10.0. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability poses a risk of denial-of-service attacks against services relying on vulnerable versions of webtransport-go. Since WebTransport is designed for low-latency, multiplexed communication over QUIC, it may be used in real-time applications such as media streaming, remote collaboration, or IoT device communication. An attacker exploiting this flaw could cause service disruptions by exhausting server memory, leading to degraded performance or crashes. This can impact business continuity, user experience, and potentially lead to financial losses or reputational damage. Organizations in sectors with high reliance on real-time web communication, such as telecommunications, media, and critical infrastructure, may be particularly affected. Additionally, the lack of authentication or user interaction requirements lowers the barrier for attackers to exploit this remotely. However, the absence of known exploits and the medium CVSS score suggest the threat is moderate but should not be underestimated given the potential for large-scale attacks if bandwidth permits.
Mitigation Recommendations
European organizations should immediately upgrade all instances of webtransport-go to version 0.10.0 or later, where the vulnerability is fixed by enforcing the 1024-byte limit on the Application Error Message field. Until upgrades can be applied, network-level mitigations should be implemented, such as rate limiting and deep packet inspection to detect and block unusually large WT_CLOSE_SESSION capsules or abnormal WebTransport traffic patterns. Deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to identify and drop oversized payloads can reduce attack surface. Monitoring memory usage and establishing alerting for abnormal resource consumption on servers running webtransport-go is recommended to detect potential exploitation attempts early. Additionally, organizations should review their exposure of WebTransport services to untrusted networks and consider restricting access where feasible. Regular vulnerability scanning and patch management processes should be enforced to prevent exploitation of this and similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-29T03:00:29.275Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698e1d24c9e1ff5ad8febc9e
Added to database: 2/12/2026, 6:34:12 PM
Last enriched: 2/12/2026, 6:49:07 PM
Last updated: 2/12/2026, 8:56:16 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26005: CWE-918: Server-Side Request Forgery (SSRF) in MacWarrior clipbucket-v5
MediumCVE-2026-26000: CWE-1021: Improper Restriction of Rendered UI Layers or Frames in xwiki xwiki-platform
MediumCVE-2026-0619: CWE-190 Integer Overflow or Wraparound in silabs.com Silicon Labs Matter
MediumCVE-2026-25933: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in arduino arduino-app-lab
MediumCVE-2026-25768: CWE-862: Missing Authorization in cloudamqp lavinmq
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.