Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1301 articles · 106378 vulns · 36/55 feeds (7d)
← Back to list
6.4
CVE-2026-33223

NATS Server: Incomplete Stripping of Nats-Request-Info Header Allows Identity Spoofing

Description

### Background NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The nats-server offers a `Nats-Request-Info:` message header, providing information about a request. ### Problem Description The NATS message header `Nats-Request-Info:` is supposed to be a guarantee of identity by the NATS server, but the stripping of this header from inbound messages was not fully effective. An attacker with valid credentials for any regular client interface could thus spoof their identity to services which rely upon this header. ### Affected Versions Any version before v2.12.6 or v2.11.15 ### Workarounds None.

Affected Products

VendorProductVersions
gogithub.com/nats-io/nats-server/v2go/github.com/nats-io/nats-server/v2: < 2.11.15, go/github.com/nats-io/nats-server/v2: >= 2.12.0-RC.1, < 2.12.6, go/github.com/nats-io/nats-server/v2: <= 2.11.14, go/github.com/nats-io/nats-server/v2: <= 2.12.5

References

  • https://github.com/advisories/GHSA-pwx7-fx9r-hr4h(advisory)
  • https://github.com/nats-io/nats-server/security/advisories/GHSA-pwx7-fx9r-hr4h
  • https://advisories.nats.io/CVE/secnote-2026-09.txt
  • https://github.com/advisories/GHSA-pwx7-fx9r-hr4h

Related News (1 articles)

Tier C
VulDB4h ago
CVE-2026-33223 | nats-io nats-server up to 2.11.14/2.12.5 Nats-Request-Info Header authentication spoofing
→ No new info (linked only)
CVSS 3.16.4 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-290
Published3/24/2026
Last enriched2h agov2
Tags
GHSA-pwx7-fx9r-hr4hgo
Trending Score41
Source articles2
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Version History

v2
Last enriched 2h ago
v2Tier C2h ago

Updated affected versions to include up to 2.11.14 and 2.12.5, changed severity to CRITICAL, and noted that the vulnerability is actively exploited.

affectedVersionsseverityactivelyExploited
via VulDB
v110h ago

Initial creation