Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22819: CWE-366: Race Condition within a Thread in akinloluwami outray

0
Medium
VulnerabilityCVE-2026-22819cvecve-2026-22819cwe-366
Published: Wed Jan 14 2026 (01/14/2026, 18:04:33 UTC)
Source: CVE Database V5
Vendor/Project: akinloluwami
Product: outray

Description

CVE-2026-22819 is a medium-severity race condition vulnerability in the open-source ngrok alternative 'outray' prior to version 0. 1. 5. It allows free plan users to obtain more subdomains than intended due to missing database transaction locking in the subdomain allocation code. The flaw impacts integrity and availability but does not affect confidentiality. Exploitation requires network access and low privileges but no user interaction. The vulnerability is fixed in version 0. 1. 5. There are no known exploits in the wild.

AI-Powered Analysis

AILast updated: 01/21/2026, 20:39:27 UTC

Technical Analysis

CVE-2026-22819 is a race condition vulnerability classified under CWE-366, found in the open-source project 'outray', an alternative to ngrok used for creating secure tunnels to localhost services. The vulnerability exists in versions prior to 0.1.5 within the subdomain allocation logic located in main/apps/web/src/routes/api/$orgSlug/subdomains/index.ts. Specifically, the issue arises from the lack of database transaction locking mechanisms when allocating subdomains to users on the free plan. This absence of locking allows a race condition where a user can simultaneously request multiple subdomains, bypassing intended limits and obtaining more subdomains than permitted. The vulnerability affects the integrity of the system by allowing unauthorized resource allocation and impacts availability by potentially exhausting subdomain resources. The CVSS v3.1 score is 5.9 (medium), with vector AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H, indicating network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and high availability impact. No known exploits have been reported in the wild. The issue was addressed in version 0.1.5 by introducing proper database transaction locks to serialize subdomain allocation requests, preventing concurrent race conditions.

Potential Impact

For European organizations leveraging outray for secure tunneling or development environments, this vulnerability can lead to unauthorized allocation of subdomains beyond allowed quotas, potentially resulting in resource exhaustion and denial of service for legitimate users. While confidentiality is not directly impacted, the integrity of resource allocation is compromised, which could facilitate abuse scenarios such as evading usage limits or launching further attacks using excess subdomains. The availability of the service could be degraded if subdomain exhaustion occurs. Organizations relying on outray in production or development pipelines may face operational disruptions. Given the medium severity and the requirement for network access with low privileges, the threat is moderate but should not be ignored, especially in environments with multiple free plan users or public-facing services.

Mitigation Recommendations

The primary mitigation is to upgrade all instances of outray to version 0.1.5 or later, where the race condition has been fixed with proper database transaction locking. Organizations should audit their deployments to identify any running vulnerable versions. Additionally, implementing rate limiting and concurrency controls at the API gateway or application level can reduce the risk of race conditions. Monitoring subdomain allocation patterns for anomalies can help detect abuse attempts. For deployments where upgrading is delayed, applying manual locking mechanisms or database-level transaction isolation can serve as temporary workarounds. Security teams should also review user privilege assignments to minimize exposure and consider restricting free plan usage or enforcing stricter quotas until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T22:50:10.289Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6967de03d0ff220b953260fe

Added to database: 1/14/2026, 6:18:43 PM

Last enriched: 1/21/2026, 8:39:27 PM

Last updated: 2/7/2026, 12:25:15 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats