Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33246: CWE-287: Improper Authentication in nats-io nats-server

0
Medium
VulnerabilityCVE-2026-33246cvecve-2026-33246cwe-287cwe-290
Published: Wed Mar 25 2026 (03/25/2026, 19:50:03 UTC)
Source: CVE Database V5
Vendor/Project: nats-io
Product: nats-server

Description

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The nats-server offers a `Nats-Request-Info:` message header, providing information about a request. This is supposed to provide enough information to allow for account/user identification, such that NATS clients could make their own decisions on how to trust a message, provided that they trust the nats-server as a broker. A leafnode connecting to a nats-server is not fully trusted unless the system account is bridged too. Thus identity claims should not have propagated unchecked. Prior to versions 2.11.15 and 2.12.6, NATS clients relying upon the Nats-Request-Info: header could be spoofed. This does not directly affect the nats-server itself, but the CVSS Confidentiality and Integrity scores are based upon what a hypothetical client might choose to do with this NATS header. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 20:17:01 UTC

Technical Analysis

NATS-Server is a high-performance messaging server used in cloud and edge native environments, facilitating communication between distributed applications. It provides a 'Nats-Request-Info:' message header intended to convey identity information about requests, enabling clients to make trust decisions based on this metadata. However, prior to versions 2.11.15 and 2.12.6, this header could be spoofed by malicious actors because leafnodes connecting to a nats-server are not fully trusted unless the system account is bridged, and identity claims could propagate unchecked. This improper authentication vulnerability (CWE-287) allows an attacker to forge the 'Nats-Request-Info:' header, misleading clients that rely on it for authentication and authorization decisions. The vulnerability does not directly compromise the nats-server itself but affects the trust model of clients consuming messages, potentially leading to unauthorized actions or data exposure. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) indicates network attack vector, low complexity, requiring some privileges but no user interaction, with a scope change and limited confidentiality and integrity impact. No known exploits have been reported, and no workarounds exist other than upgrading to patched versions 2.11.15 or 2.12.6. This vulnerability highlights the importance of validating identity claims in distributed messaging systems and ensuring that trust boundaries are properly enforced.

Potential Impact

The primary impact of this vulnerability lies in the potential for attackers to spoof identity information within the 'Nats-Request-Info:' header, which clients use to make trust decisions. This can lead to unauthorized access to sensitive data or unauthorized execution of operations if clients accept forged identity claims. Confidentiality and integrity of messages may be compromised, potentially allowing attackers to impersonate legitimate users or services. Since the vulnerability does not affect the server's availability or the server itself directly, denial of service is unlikely. However, the trust model of distributed systems relying on NATS messaging can be undermined, leading to cascading security issues in microservices or cloud-native applications. Organizations using affected versions risk data leakage, privilege escalation within client applications, and potential disruption of secure communication channels. The lack of workarounds means that until patched, systems remain exposed to these risks.

Mitigation Recommendations

The definitive mitigation is to upgrade all affected nats-server instances to version 2.11.15 or 2.12.6 or later, where the vulnerability is fixed. Organizations should audit their deployment environments to identify any instances running vulnerable versions and prioritize patching. Additionally, clients relying on the 'Nats-Request-Info:' header should implement additional validation mechanisms, such as cryptographic verification of identity claims or enforcing stricter trust boundaries between leafnodes and system accounts. Network segmentation and limiting privileges of leafnodes can reduce the risk of spoofing. Monitoring and logging of unusual or unexpected identity claims in message headers can help detect exploitation attempts. Finally, security teams should review their overall messaging trust architecture to avoid over-reliance on unverified headers for authentication decisions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T02:42:27.509Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c43f15f4197a8e3b7dafee

Added to database: 3/25/2026, 8:01:25 PM

Last enriched: 3/25/2026, 8:17:01 PM

Last updated: 3/26/2026, 5:40:17 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses