Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21438: CWE-401: Missing Release of Memory after Effective Lifetime in quic-go webtransport-go

0
Medium
VulnerabilityCVE-2026-21438cvecve-2026-21438cwe-401cwe-459
Published: Thu Feb 12 2026 (02/12/2026, 18:25:34 UTC)
Source: CVE Database V5
Vendor/Project: quic-go
Product: webtransport-go

Description

webtransport-go is an implementation of the WebTransport protocol. Prior to 0.10.0, an attacker can cause unbounded memory consumption repeatedly creating and closing many WebTransport streams. Closed streams were not removed from an internal session map, preventing garbage collection of their resources. This vulnerability is fixed in v0.10.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/20/2026, 08:22:29 UTC

Technical Analysis

CVE-2026-21438 is a vulnerability identified in the webtransport-go library, an implementation of the WebTransport protocol used for multiplexed, bidirectional communication over QUIC. Prior to version 0.10.0, the library contains a memory management flaw where closed WebTransport streams are not properly removed from an internal session map. This omission prevents the garbage collector from reclaiming memory associated with these streams, leading to unbounded memory growth. An attacker can exploit this by repeatedly creating and closing WebTransport streams, causing the application to consume increasing amounts of memory until exhaustion occurs. The vulnerability is classified under CWE-401 (Missing Release of Memory after Effective Lifetime) and CWE-459 (Incomplete Cleanup). It does not require authentication or user interaction and can be triggered remotely over the network. The impact is primarily a denial of service condition due to resource exhaustion, with no direct compromise of confidentiality or integrity. The issue was publicly disclosed and assigned CVE-2026-21438 with a CVSS v3.1 base score of 5.3 (medium severity). The fix involves proper removal of closed streams from the session map to allow garbage collection, implemented in webtransport-go version 0.10.0.

Potential Impact

The primary impact of this vulnerability is a denial of service (DoS) through unbounded memory consumption. Attackers can exploit this flaw remotely without authentication or user interaction, making it relatively easy to trigger. Organizations running services that utilize vulnerable versions of webtransport-go may experience degraded performance or crashes due to memory exhaustion, potentially disrupting critical communications or applications relying on WebTransport. This can affect service availability and reliability, leading to operational downtime and potential financial losses. While the vulnerability does not expose sensitive data or allow unauthorized data modification, the disruption of service can have cascading effects, especially in environments where WebTransport is used for real-time or critical data transport. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and medium severity score warrant prompt mitigation.

Mitigation Recommendations

The most effective mitigation is to upgrade all instances of webtransport-go to version 0.10.0 or later, where the vulnerability is fixed. For organizations unable to upgrade immediately, implementing resource limits on memory usage per session or stream can help contain the impact. Monitoring tools should be configured to detect abnormal memory growth patterns indicative of exploitation attempts. Network-level protections such as rate limiting or filtering suspicious traffic patterns targeting WebTransport endpoints can reduce exposure. Additionally, applying application-layer controls to limit the number of streams created per client or session can prevent abuse. Regularly auditing dependencies and maintaining an up-to-date inventory of software versions will facilitate timely patching. Finally, incorporating fuzz testing and memory profiling in development cycles can help identify similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T03:00:29.275Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698e1d24c9e1ff5ad8febca6

Added to database: 2/12/2026, 6:34:12 PM

Last enriched: 2/20/2026, 8:22:29 AM

Last updated: 3/29/2026, 11:22:57 PM

Views: 149

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses