Description
OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40.0, multi-value baggage: header extraction parses each header field-value independently and aggregates members across values. This allows an attacker to amplify cpu and allocations by sending many baggage: header lines, even when each individual value is within the 8192-byte per-value parse limit. This vulnerability is fixed in 1.41.0.
Published: 2026-04-07
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Denial of Service via CPU and memory exhaustion
Action: Apply Patch
AI Analysis

Impact

OpenTelemetry‑Go libraries from version 1.36.0 through 1.40.0 contain a flaw in the handling of multi‑value baggage headers. The extraction logic parses each header value separately and then aggregates all entries, which allows an attacker to send many baggage: header lines. Even though each individual value is limited to 8192 bytes, the cumulative effect can generate a large number of temporary objects, leading to excessive CPU usage and memory allocation. This results in a denial‑of‑service condition for the service that processes the headers, without exposing any confidential data or elevating privileges.

Affected Systems

The vulnerability affects the OpenTelemetry‑Go package distributed by the Open Telemetry project. Systems that embed this Go library in their monitoring or instrumentation services and accept incoming baggage headers are at risk. Specifically, versions 1.36.0 through 1.40.0 are affected; versions 1.41.0 and later contain the fix.

Risk and Exploitability

The CVSS base score of 7.5 reflects a high severity, while the EPSS score of less than 1% indicates a low probability of active exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, suggesting no widespread exploitation. The attack vector is not explicitly stated in the CVE description; it is inferred that an attacker would need to deliver crafted baggage headers over HTTP or a compatible transport to a service that ingests baggage data. Once triggered, the target experiences high CPU consumption and memory pressure, potentially denying legitimate traffic.

Generated by OpenCVE AI on April 14, 2026 at 21:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenTelemetry‑Go to version 1.41.0 or newer
  • Verify that all code dependencies reference the patched version and run integration tests
  • Monitor CPU and memory metrics for services that ingest baggage headers and set alert thresholds
  • If an upgrade is not immediately possible, implement application‑level filtering to reject excessively large or numerous baggage header lines

Generated by OpenCVE AI on April 14, 2026 at 21:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mh2q-q3fh-2475 OpenTelemetry-Go: multi-value `baggage` header extraction causes excessive allocations (remote dos amplification)
History

Tue, 14 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Opentelemetry opentelemetry
CPEs cpe:2.3:a:opentelemetry:opentelemetry:*:*:*:*:*:go:*:*
Vendors & Products Opentelemetry opentelemetry

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Opentelemetry
Opentelemetry opentelemetry-go
Vendors & Products Opentelemetry
Opentelemetry opentelemetry-go

Wed, 08 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40.0, multi-value baggage: header extraction parses each header field-value independently and aggregates members across values. This allows an attacker to amplify cpu and allocations by sending many baggage: header lines, even when each individual value is within the 8192-byte per-value parse limit. This vulnerability is fixed in 1.41.0.
Title OpenTelemetry-Go multi-value `baggage` header extraction causes excessive allocations (remote dos amplification)
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Opentelemetry Opentelemetry Opentelemetry-go
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-08T15:37:02.444Z

Reserved: 2026-03-04T14:44:00.713Z

Link: CVE-2026-29181

cve-icon Vulnrichment

Updated: 2026-04-08T15:36:58.862Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T21:17:16.003

Modified: 2026-04-14T18:45:01.363

Link: CVE-2026-29181

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:15:11Z

Weaknesses