Impact
A malicious client can connect to the NATS Server’s WebSockets port before authentication and send a large amount of data, causing the server to allocate unbounded memory. This results in memory exhaustion, making the server unresponsive or causing it to terminate, thereby denying service to legitimate users. The weakness is a form of resource exhaustion, reflected in CWE‑770.
Affected Systems
This issue affects nats-io NATS Server versions earlier than 2.11.15 and 2.12.6. The fixed releases, 2.11.15 and newer as well as 2.12.6 and newer, contain a patch that mitigates the vulnerability.
Risk and Exploitability
The CVSS score of 5.3 classifies the problem as medium severity, while an EPSS score below 1% indicates a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker only needs network reach to the WebSockets port and the ability to send a large volume of data; no authentication or elevated privileges are required, but the bandwidth requirement limits the practical threat to most deployments.
OpenCVE Enrichment
Github GHSA