Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33249: CWE-863: Incorrect Authorization in nats-io nats-server

0
Medium
VulnerabilityCVE-2026-33249cvecve-2026-33249cwe-863
Published: Wed Mar 25 2026 (03/25/2026, 20:21:30 UTC)
Source: CVE Database V5
Vendor/Project: nats-io
Product: nats-server

Description

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Starting in version 2.11.0 and prior to versions 2.11.15 and 2.12.6, a valid client which uses message tracing headers can indicate that the trace messages can be sent to an arbitrary valid subject, including those to which the client does not have publish permission. The payload is a valid trace message and not chosen by the attacker. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 20:45:57 UTC

Technical Analysis

NATS-Server is a high-performance messaging server used in cloud and edge native environments. The vulnerability identified as CVE-2026-33249 relates to incorrect authorization (CWE-863) in how the server handles message tracing headers. Specifically, from version 2.11.0 up to versions before 2.11.15, and from 2.12.0-preview.1 up to before 2.12.6, a valid client that includes message tracing headers can cause trace messages to be sent to any valid subject, including those subjects for which the client lacks explicit publish permissions. The payload of these trace messages is a valid trace message generated by the server and is not attacker-controlled, which limits the scope of potential damage. However, the ability to publish trace messages to unauthorized subjects represents an integrity violation, as it allows clients to inject messages into channels they should not access. This could potentially disrupt message flows, cause confusion, or be leveraged in complex attack chains. The vulnerability does not affect confidentiality or availability directly. The issue was addressed in versions 2.11.15 and 2.12.6 by tightening authorization checks on trace message publishing. No known workarounds exist, so patching is the primary remediation. The CVSS 3.1 base score is 4.3, reflecting a medium severity due to the low complexity of exploitation, requirement for valid client privileges, and lack of user interaction.

Potential Impact

The primary impact of this vulnerability is on message integrity within environments using affected nats-server versions. Unauthorized publishing of trace messages to arbitrary subjects can lead to message pollution, misleading trace data, or interference with legitimate message flows. This can degrade the reliability and trustworthiness of messaging systems, potentially causing operational disruptions or complicating incident investigations. While the payload is not attacker-controlled, the ability to send trace messages to unauthorized subjects could be exploited in multi-stage attacks or to bypass certain monitoring or filtering mechanisms. Organizations relying on nats-server for critical messaging in cloud-native or edge deployments may experience degraded service quality or increased risk of message-based attacks. Since no known exploits are currently reported in the wild, the immediate risk is moderate, but the vulnerability should be addressed promptly to prevent future exploitation.

Mitigation Recommendations

The definitive mitigation is to upgrade nats-server to version 2.11.15 or later, or 2.12.6 or later, where the authorization checks for trace message publishing have been corrected. Since no workarounds exist, organizations should prioritize patching affected systems. Additionally, organizations should audit their messaging permissions and monitor trace message subjects for anomalies that could indicate exploitation attempts. Implementing strict network segmentation and access controls around nats-server instances can limit the ability of unauthorized clients to connect and exploit this vulnerability. Logging and alerting on unusual trace message activity can help detect attempts to misuse this flaw. Finally, reviewing client authentication and authorization policies to ensure minimal necessary privileges are granted will reduce the risk surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T02:42:27.509Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c4460af4197a8e3b7fad03

Added to database: 3/25/2026, 8:31:06 PM

Last enriched: 3/25/2026, 8:45:57 PM

Last updated: 3/26/2026, 5:27:27 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses