Description
Improper Resource Shutdown or Release vulnerability in KrakenD, SLU KrakenD-CE (CircuitBreaker modules), KrakenD, SLU KrakenD-EE (CircuitBreaker modules). This issue affects KrakenD-CE: before 2.13.1; KrakenD-EE: before 2.12.5.
Published: 2026-02-25
Score: 1.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service through uncontrolled resource leakage
Action: Patch
AI Analysis

Impact

This vulnerability arises from improper handling of context cancellations in the CircuitBreaker modules of KrakenD. When a context is cancelled, the program does not adequately close or release related resources, creating a leak that can exhaust system resources over time. The weakness is classified as CWE-404, an improper resource shutdown or release flaw, indicating that the application may fail to shut down resources correctly when required. The net consequence is a gradual degradation of the service, potentially leading to service interruption if the leaked resources accumulate.

Affected Systems

KrakenD Community Edition before version 2.13.1 and KrakenD Enterprise Edition before version 2.12.5 are susceptible. These versions employ the CircuitBreaker modules where the context cancelation logic is flawed. Any deployment of these editions that still uses the legacy CircuitBreaker code is at risk.

Risk and Exploitability

The CVSS base score is 1.3, signifying a low severity. The EPSS score is reported as < 1 %, indicating a very low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is local or remote through API calls that exercise the CircuitBreaker; an attacker would need to trigger context cancellations repeatedly to exhaust resources. Because the flaw requires repeated activity and is not easily exploitable, immediate damage is limited, but unattended use can still lead to service degradation over time.

Generated by OpenCVE AI on April 18, 2026 at 10:43 UTC.

Remediation

Vendor Solution

Vulnerability has been fixed. Patched versions are available.


OpenCVE Recommended Actions

  • Upgrade KrakenD-CE to version 2.13.1 or later
  • Upgrade KrakenD-EE to version 2.12.5 or later
  • Limit concurrent requests or enable rate limiting to mitigate the risk of resource exhaustion until the patch is applied

Generated by OpenCVE AI on April 18, 2026 at 10:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
References

Wed, 25 Feb 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Resource Shutdown or Release vulnerability in KrakenD, SLU KrakenD-CE (CircuitBreaker modules), KrakenD, SLU KrakenD-EE (CircuitBreaker modules). This issue affects KrakenD-CE: before 2.13.1; KrakenD-EE: before 2.13.0. Improper Resource Shutdown or Release vulnerability in KrakenD, SLU KrakenD-CE (CircuitBreaker modules), KrakenD, SLU KrakenD-EE (CircuitBreaker modules). This issue affects KrakenD-CE: before 2.13.1; KrakenD-EE: before 2.12.5.
References

Wed, 25 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description Improper Resource Shutdown or Release vulnerability in KrakenD, SLU KrakenD-CE (CircuitBreaker modules), KrakenD, SLU KrakenD-EE (CircuitBreaker modules). This issue affects KrakenD-CE: before 2.13.1; KrakenD-EE: before 2.13.0.
Title Improper management of context cancelations
First Time appeared Krakend
Krakend krakend-ce
Krakend krakend-ee
Weaknesses CWE-404
CPEs cpe:2.3:a:krakend:krakend-ce:*:*:*:*:*:*:*:*
cpe:2.3:a:krakend:krakend-ee:*:*:*:*:*:*:*:*
Vendors & Products Krakend
Krakend krakend-ce
Krakend krakend-ee
References
Metrics cvssV4_0

{'score': 1.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/S:N/AU:Y/R:A/V:D/RE:L/U:Clear'}


Subscriptions

Krakend Krakend-ce Krakend-ee
cve-icon MITRE

Status: PUBLISHED

Assigner: KrakenD

Published:

Updated: 2026-02-25T20:21:08.239Z

Reserved: 2026-02-25T15:11:30.701Z

Link: CVE-2026-3206

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-02-25T16:23:30.423

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-3206

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:45:43Z

Weaknesses