CVE-2026-22819: CWE-366: Race Condition within a Thread in akinloluwami outray
CVE-2026-22819 is a medium-severity race condition vulnerability in the open-source ngrok alternative 'outray' prior to version 0. 1. 5. It allows free plan users to obtain more subdomains than intended due to missing database transaction locking in the subdomain allocation code. The flaw impacts integrity and availability but does not affect confidentiality. Exploitation requires network access and low privileges but no user interaction. The vulnerability is fixed in version 0. 1. 5. There are no known exploits in the wild.
AI Analysis
Technical Summary
CVE-2026-22819 is a race condition vulnerability classified under CWE-366, found in the open-source project 'outray', an alternative to ngrok used for creating secure tunnels to localhost services. The vulnerability exists in versions prior to 0.1.5 within the subdomain allocation logic located in main/apps/web/src/routes/api/$orgSlug/subdomains/index.ts. Specifically, the issue arises from the lack of database transaction locking mechanisms when allocating subdomains to users on the free plan. This absence of locking allows a race condition where a user can simultaneously request multiple subdomains, bypassing intended limits and obtaining more subdomains than permitted. The vulnerability affects the integrity of the system by allowing unauthorized resource allocation and impacts availability by potentially exhausting subdomain resources. The CVSS v3.1 score is 5.9 (medium), with vector AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H, indicating network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and high availability impact. No known exploits have been reported in the wild. The issue was addressed in version 0.1.5 by introducing proper database transaction locks to serialize subdomain allocation requests, preventing concurrent race conditions.
Potential Impact
For European organizations leveraging outray for secure tunneling or development environments, this vulnerability can lead to unauthorized allocation of subdomains beyond allowed quotas, potentially resulting in resource exhaustion and denial of service for legitimate users. While confidentiality is not directly impacted, the integrity of resource allocation is compromised, which could facilitate abuse scenarios such as evading usage limits or launching further attacks using excess subdomains. The availability of the service could be degraded if subdomain exhaustion occurs. Organizations relying on outray in production or development pipelines may face operational disruptions. Given the medium severity and the requirement for network access with low privileges, the threat is moderate but should not be ignored, especially in environments with multiple free plan users or public-facing services.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of outray to version 0.1.5 or later, where the race condition has been fixed with proper database transaction locking. Organizations should audit their deployments to identify any running vulnerable versions. Additionally, implementing rate limiting and concurrency controls at the API gateway or application level can reduce the risk of race conditions. Monitoring subdomain allocation patterns for anomalies can help detect abuse attempts. For deployments where upgrading is delayed, applying manual locking mechanisms or database-level transaction isolation can serve as temporary workarounds. Security teams should also review user privilege assignments to minimize exposure and consider restricting free plan usage or enforcing stricter quotas until patches are applied.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden
CVE-2026-22819: CWE-366: Race Condition within a Thread in akinloluwami outray
Description
CVE-2026-22819 is a medium-severity race condition vulnerability in the open-source ngrok alternative 'outray' prior to version 0. 1. 5. It allows free plan users to obtain more subdomains than intended due to missing database transaction locking in the subdomain allocation code. The flaw impacts integrity and availability but does not affect confidentiality. Exploitation requires network access and low privileges but no user interaction. The vulnerability is fixed in version 0. 1. 5. There are no known exploits in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2026-22819 is a race condition vulnerability classified under CWE-366, found in the open-source project 'outray', an alternative to ngrok used for creating secure tunnels to localhost services. The vulnerability exists in versions prior to 0.1.5 within the subdomain allocation logic located in main/apps/web/src/routes/api/$orgSlug/subdomains/index.ts. Specifically, the issue arises from the lack of database transaction locking mechanisms when allocating subdomains to users on the free plan. This absence of locking allows a race condition where a user can simultaneously request multiple subdomains, bypassing intended limits and obtaining more subdomains than permitted. The vulnerability affects the integrity of the system by allowing unauthorized resource allocation and impacts availability by potentially exhausting subdomain resources. The CVSS v3.1 score is 5.9 (medium), with vector AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H, indicating network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and high availability impact. No known exploits have been reported in the wild. The issue was addressed in version 0.1.5 by introducing proper database transaction locks to serialize subdomain allocation requests, preventing concurrent race conditions.
Potential Impact
For European organizations leveraging outray for secure tunneling or development environments, this vulnerability can lead to unauthorized allocation of subdomains beyond allowed quotas, potentially resulting in resource exhaustion and denial of service for legitimate users. While confidentiality is not directly impacted, the integrity of resource allocation is compromised, which could facilitate abuse scenarios such as evading usage limits or launching further attacks using excess subdomains. The availability of the service could be degraded if subdomain exhaustion occurs. Organizations relying on outray in production or development pipelines may face operational disruptions. Given the medium severity and the requirement for network access with low privileges, the threat is moderate but should not be ignored, especially in environments with multiple free plan users or public-facing services.
Mitigation Recommendations
The primary mitigation is to upgrade all instances of outray to version 0.1.5 or later, where the race condition has been fixed with proper database transaction locking. Organizations should audit their deployments to identify any running vulnerable versions. Additionally, implementing rate limiting and concurrency controls at the API gateway or application level can reduce the risk of race conditions. Monitoring subdomain allocation patterns for anomalies can help detect abuse attempts. For deployments where upgrading is delayed, applying manual locking mechanisms or database-level transaction isolation can serve as temporary workarounds. Security teams should also review user privilege assignments to minimize exposure and consider restricting free plan usage or enforcing stricter quotas until patches are applied.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-09T22:50:10.289Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6967de03d0ff220b953260fe
Added to database: 1/14/2026, 6:18:43 PM
Last enriched: 1/21/2026, 8:39:27 PM
Last updated: 2/7/2026, 12:25:15 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.