Description
A flaw has been found in psi-probe PSI Probe up to 5.3.0. The impacted element is the function handleRequestInternal of the file psi-probe-core/src/main/java/psiprobe/controllers/sessions/ExpireSessionsController.java of the component Session Handler. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-26
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A flaw exists in the handleRequestInternal function of the ExpireSessionsController within PSI Probe. By manipulating the expected input to this handler, an attacker can cause the application to become unresponsive, leading to a denial of service. The vulnerability is categorized as a failure to safely handle a request, identified as CWE-404.

Affected Systems

The weakness affects PSI Probe versions up to and including 5.3.0. Only installations of psi-probe that have not applied a later release are vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. The EPSS score of less than 1% suggests very low but non-zero probability of exploitation. The vulnerability has been publicly disclosed and an exploit is available, yet it is not currently listed in the CISA KEV catalog. The attack can be launched remotely, so any exposed PSI Probe instance is a potential target. Absence of a published fix until an update means that unpatched deployments remain exposed to this denial-of-service vector.

Generated by OpenCVE AI on April 17, 2026 at 14:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PSI Probe to a version newer than 5.3.0 to eliminate the vulnerability.
  • If an upgrade is not immediately possible, restrict network access to the controller handling session expiration, for example by configuring firewall rules to block external requests to that endpoint.
  • Continuously monitor application logs for repeated failed or malformed requests to the session expiration handler, as indicators of potential exploitation attempts.

Generated by OpenCVE AI on April 17, 2026 at 14:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rx6w-2w6h-r346 PSI Probe: Broken access control can lead to DoS
History

Tue, 03 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:psi-probe:psi_probe:*:*:*:*:*:*:*:*

Fri, 27 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Psi-probe
Psi-probe psi Probe
Vendors & Products Psi-probe
Psi-probe psi Probe

Fri, 27 Feb 2026 00:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in psi-probe PSI Probe up to 5.3.0. The impacted element is the function handleRequestInternal of the file psi-probe-core/src/main/java/psiprobe/controllers/sessions/ExpireSessionsController.java of the component Session Handler. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title psi-probe PSI Probe Session ExpireSessionsController.java handleRequestInternal denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Psi-probe Psi Probe
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T19:57:57.822Z

Reserved: 2026-02-26T15:13:39.920Z

Link: CVE-2026-3269

cve-icon Vulnrichment

Updated: 2026-02-27T19:57:51.600Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T00:16:58.717

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3269

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:15:21Z

Weaknesses