Description
Outray openSource ngrok alternative. Prior to 0.1.5, a TOCTOU race condition vulnerability allows a user to exceed the set number of active tunnels in their subscription plan. This vulnerability is fixed in 0.1.5.
Published: 2026-01-14
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Exceeded tunnel limits (resource abuse)
Action: Patch
AI Analysis

Impact

The issue is a time‑of‑check to time‑of‑use race condition that allows a user to create more tunnels than are permitted by their subscription. The counter that tracks active tunnels is updated in a non‑atomic way; when two tunnel Creation requests occur concurrently, both can pass the check before the counter is incremented, resulting in an over‑run of the tunnel quota. This resource abuse can lead to denial of service for other users or a breach of contractual limits.

Affected Systems

The vulnerable product is Outray, an open‑source ngrok alternative developed by akinloluwami. Any installation of Outray older than version 0.1.5 is affected. The problem was fixed in 0.1.5 and later releases are immune.

Risk and Exploitability

The CVSS score of 6.3 indicates a medium severity. The EPSS metric is below 1 %, suggesting a very low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is local or user‑level access to the Outray CLI, as the race condition is triggered by concurrent tunnel creation from an authorized session. Once exploited, the attacker can exhaust the tenant’s tunnel quota.

Generated by OpenCVE AI on April 18, 2026 at 16:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Outray to version 0.1.5 or newer, which contains the race‑condition fix
  • If building from source, apply the commit referenced in the advisory (08c61495761349e7fd2965229c3faa8d7b1c1581) to incorporate the patch
  • If upgrading is not immediately possible, block or throttle tunnel creation through external firewall rules or application‑level limits to enforce the subscription quota

Generated by OpenCVE AI on April 18, 2026 at 16:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3pqc-836w-jgr7 Outray cli is vulnerable to race conditions in tunnels creation
History

Tue, 20 Jan 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Outray
Outray outray
CPEs cpe:2.3:a:outray:outray:*:*:*:*:*:node.js:*:*
Vendors & Products Outray
Outray outray
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Thu, 15 Jan 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Outray-tunnel
Outray-tunnel outray
Vendors & Products Outray-tunnel
Outray-tunnel outray

Wed, 14 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Description Outray openSource ngrok alternative. Prior to 0.1.5, a TOCTOU race condition vulnerability allows a user to exceed the set number of active tunnels in their subscription plan. This vulnerability is fixed in 0.1.5.
Title Outray cli is vulnerable to race conditions in tunnels creation
Weaknesses CWE-367
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Outray Outray
Outray-tunnel Outray
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-14T15:19:46.837Z

Reserved: 2026-01-09T22:50:10.289Z

Link: CVE-2026-22820

cve-icon Vulnrichment

Updated: 2026-01-14T15:19:38.672Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-14T15:16:05.663

Modified: 2026-01-20T14:52:10.373

Link: CVE-2026-22820

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:30:05Z

Weaknesses