CVE-2026-33247Insertion of Sensitive Information Into Debugging Code in Nats-server

Severity
5.3MEDIUMNVD
EPSS
0.0%
top 90.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25
Latest updateMar 26

Description

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, if a nats-server is run with static credentials for all clients provided via argv (the command-line), then those credentials are visible to any user who can see the monitoring port, if that too is enabled. The `/debug/vars` end-point contains an unredacted copy of argv. Versions 2.11.15 and 2.12.6 contain a fix. As a workaround, configure credentials inside a conf

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.6 | Impact: 3.6

Affected Packages5 packages

debiandebian/nats-server< nats-server 2.12.6-1 (forky)
CVEListV5nats-io/nats-server< 2.11.15+1
NVDlinuxfoundation/nats-server2.12.02.12.6+1
Gogithub.com/nats-io_nats-server_v22.12.0-RC.12.12.6+1
Debianlinuxfoundation/nats-server< 2.12.6-1

🔴Vulnerability Details

4
OSV
NATS credentials are exposed in monitoring port via command-line argv in github.com/nats-io/nats-server2026-03-26
OSV
CVE-2026-33247: NATS-Server is a High-Performance server for NATS2026-03-25
GHSA
NATS credentials are exposed in monitoring port via command-line argv2026-03-24
OSV
NATS credentials are exposed in monitoring port via command-line argv2026-03-24

📋Vendor Advisories

2
Red Hat
github.com/nats-io/nats-server: NATS-Server: Information disclosure of credentials via monitoring port and command-line arguments2026-03-25
Debian
CVE-2026-33247: nats-server - NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-33247 Impact, Exploitability, and Mitigation Steps | Wiz