Github.Com Nats-Io Nats-Server V2 vulnerabilities
27 known vulnerabilities affecting github.com/nats-io_nats-server_v2.
Total CVEs
27
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH15MEDIUM8LOW1UNKNOWN1
Vulnerabilities
Page 1 of 2
CVE-2026-27889HIGH≥ 2.2.0, < 2.11.14≥ 2.12.0, < 2.12.52026-03-25
CVE-2026-27889 [HIGH] CWE-190 NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead
NATS: Pre-auth remote server crash via WebSocket frame length overflow in wsRead
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
When using WebSockets, a malicious client can trigger a server crash with crafted frames, before authentication.
### Problem Description
A mi
ghsaosv
CVE-2026-33217HIGH≥ 0, < 2.11.15≥ 2.12.0-RC.1, < 2.12.62026-03-24
CVE-2026-33217 [HIGH] CWE-863 NATS allows MQTT clients to bypass ACL checks
NATS allows MQTT clients to bypass ACL checks
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server provides an MQTT client interface.
### Problem Description
When using ACLs on message subjects, these ACLs were not applied in the `$MQTT.>` namespace, allowing MQTT clients to bypass ACL checks f
ghsaosv
CVE-2026-33216HIGH≥ 0, < 2.11.15≥ 2.12.0-RC.1, < 2.12.62026-03-24
CVE-2026-33216 [HIGH] CWE-256 NATS has MQTT plaintext password disclosure
NATS has MQTT plaintext password disclosure
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server provides an MQTT client interface.
### Problem Description
For MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating identity statement (JWT) an
ghsaosv
CVE-2026-29785HIGH≥ 0, < 2.11.14≥ 2.12.0-RC.1, < 2.12.52026-03-24
CVE-2026-29785 [HIGH] CWE-476 NATS Server panic via malicious compression on leafnode port
NATS Server panic via malicious compression on leafnode port
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
When configured to accept leafnode connections (for a hub/spoke topology of multiple nats-servers), then the default configuration allows for negotiating compression; a malicious remot
ghsaosv
CVE-2026-33219HIGHCVSS 7.5≥ 0, < 2.11.15≥ 2.12.0-RC.1, < 2.12.62026-03-24
CVE-2026-33219 [HIGH] CWE-770 NATS is vulnerable to pre-auth DoS through WebSockets client service
NATS is vulnerable to pre-auth DoS through WebSockets client service
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server offers a WebSockets client service, used in deployments where browsers are the NATS clients.
### Problem Description
A malicious client which can con
ghsaosv
CVE-2026-33218HIGHCVSS 7.5≥ 0, < 2.11.15≥ 2.12.0-RC.1, < 2.12.62026-03-24
CVE-2026-33218 [HIGH] CWE-20 NATS has pre-auth server panic via leafnode handling
NATS has pre-auth server panic via leafnode handling
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server allows hub/spoke topologies using "leafnode" connections by other nats-servers.
### Problem Description
A client which can connect to the leafnode port can crash the nats-server with
ghsaosv
CVE-2026-33247HIGH≥ 0, < 2.11.15≥ 2.12.0-RC.1, < 2.12.62026-03-24
CVE-2026-33247 [HIGH] CWE-215 NATS credentials are exposed in monitoring port via command-line argv
NATS credentials are exposed in monitoring port via command-line argv
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server provides an optional monitoring port, which provides access to sensitive data. The nats-server can take certain configuration options on the command-l
ghsaosv
CVE-2026-33248MEDIUM≥ 0, < 2.11.15≥ 2.12.0-RC.1, < 2.12.62026-03-24
CVE-2026-33248 [MEDIUM] CWE-287 NATS has mTLS verify_and_map authentication bypass via incorrect Subject DN matching
NATS has mTLS verify_and_map authentication bypass via incorrect Subject DN matching
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
One authentication model supported is mTLS, deriving the NATS client identity from properties of the TLS Client Certificate.
### Prob
ghsaosv
CVE-2026-33249MEDIUM≥ 2.11.0, < 2.11.15≥ 2.12.0-preview.1, < 2.12.62026-03-24
CVE-2026-33249 [MEDIUM] CWE-863 NATS: Message tracing can be redirected to arbitrary subject
NATS: Message tracing can be redirected to arbitrary subject
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server supports telemetry on messages, using the per-message NATS headers.
### Problem Description
A valid client which uses message tracing headers can indicate that the
ghsaosv
CVE-2026-33223MEDIUM≥ 0, < 2.11.15≥ 2.12.0-RC.1, < 2.12.62026-03-24
CVE-2026-33223 [MEDIUM] CWE-290 NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing
NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server offers a `Nats-Request-Info:` message header, providing information about a request.
### Problem Description
The
ghsaosv
CVE-2026-33246MEDIUM≥ 0, < 2.11.15≥ 2.12.0-RC.1, < 2.12.62026-03-24
CVE-2026-33246 [MEDIUM] CWE-287 NATS: Leafnode connections allow spoofing of Nats-Request-Info identity headers
NATS: Leafnode connections allow spoofing of Nats-Request-Info identity headers
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server allows hub/spoke topologies using "leafnode" connections by other nats-servers. NATS messages can have headers.
### Problem Des
ghsaosv
CVE-2026-33215MEDIUMCVSS 6.5≥ 0, < 2.11.15≥ 2.12.0-RC.1, < 2.12.62026-03-24
CVE-2026-33215 [MEDIUM] CWE-287 NATS is vulnerable to MQTT hijacking via Client ID
NATS is vulnerable to MQTT hijacking via Client ID
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server provides an MQTT client interface.
### Problem Description
Sessions and Messages can by hijacked via MQTT Client ID malfeasance.
### Affected Versions
Any version before v2.12.6 or v
ghsaosv
CVE-2026-33222MEDIUM≥ 0, < 2.11.15≥ 2.12.0-RC.1, < 2.12.62026-03-24
CVE-2026-33222 [MEDIUM] CWE-285 NATS JetStream has an authorization bypass through its Management API
NATS JetStream has an authorization bypass through its Management API
### Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The persistent storage feature, JetStream, has a management API which has many features, amongst which are backup and restore.
### Problem Description
Users with
ghsaosv
CVE-2026-27571MEDIUM≥ 0, < 2.11.12≥ 2.12.0-RC.1, < 2.12.32026-02-24
CVE-2026-27571 [MEDIUM] CWE-409 nats-server websockets are vulnerable to pre-auth memory DoS
nats-server websockets are vulnerable to pre-auth memory DoS
### Impact
The WebSockets handling of NATS messages handles compressed messages via the WebSockets negotiated compression. The implementation bound the memory size of a NATS message but did not independently bound the memory consumption of the memory stream when constructing a NATS message which might then fail validation for size reasons.
A
ghsaosv
CVE-2025-30215CRITICAL≥ 2.11.0-RC.1, < 2.11.1≥ 2.2.0, < 2.10.272025-04-15
CVE-2025-30215 [CRITICAL] CWE-285 NATS Server may fail to authorize certain Jetstream admin APIs
NATS Server may fail to authorize certain Jetstream admin APIs
## Advisory
The management of JetStream assets happens with messages in the `$JS.` subject namespace in the system account; this is partially exposed into regular accounts to allow account holders to manage their assets.
Some of the JS API requests were missing access controls, allowing any user with JS management permissions in any ac
ghsaosv
CVE-2022-28357UNKNOWN≥ 2.2.0, < 2.7.42024-08-21
CVE-2022-28357 NATS nats-server allows directory traversal via unintended path to a management action in github.com/nats-io/nats-server
NATS nats-server allows directory traversal via unintended path to a management action in github.com/nats-io/nats-server
NATS nats-server allows directory traversal via unintended path to a management action in github.com/nats-io/nats-server
osv
CVE-2022-29946HIGH≥ 0, < 2.8.22024-07-11
CVE-2022-29946 [HIGH] CWE-863 NATS Server and Streaming Server fails to enforce negative user permissions, may allow denied subjects
NATS Server and Streaming Server fails to enforce negative user permissions, may allow denied subjects
NATS.io NATS Server before 2.8.2 and Streaming Server before 0.24.6 could allow a remote attacker to bypass security restrictions, caused by the failure to enforce negative user permissions in one scenario. By using a queue subscription on the wildcard, an attack
ghsaosv
CVE-2021-32026LOW≥ 0, < 2.2.32024-05-14
CVE-2021-32026 [LOW] NATS server TLS missing ciphersuite settings when CLI flags used
NATS server TLS missing ciphersuite settings when CLI flags used
(This advisory is canonically )
### Problem Description
The NATS server by default uses a restricted set of modern ciphersuites for TLS. This selection can be overridden through configuration. The defaults include just RSA and ECDSA with either AES/GCM with a SHA2 digest or ChaCha20/Poly1305.
The configuration system allows for extensive use o
ghsaosv
CVE-2023-46129HIGH≥ 2.10.0, < 2.10.42023-10-31
CVE-2023-46129 [HIGH] CWE-321 xkeys seal encryption used fixed key for all encryption
xkeys seal encryption used fixed key for all encryption
## Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authenticatio
ghsaosv
CVE-2023-47090HIGH≥ 2.2.0, < 2.9.23≥ 2.10.0, < 2.10.22023-10-19
CVE-2023-47090 [HIGH] CWE-305 NATS.io: Adding accounts for just the system account adds auth bypass
NATS.io: Adding accounts for just the system account adds auth bypass
## Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
NATS users exist within accounts, and once using accounts, the old authorization block is not applicable.
## Problem Description
Without any authorization rules in
ghsaosv
1 / 2Next →