Impact
An authorization bypass vulnerability was discovered in NATS-Server’s JetStream management API. The flaw allows an attacker who has JetStream admin API access to one stream to restore data into an entirely different stream, exposing data that should remain isolated and compromising confidentiality. The weakness reflects improper authorization checks (CWE-285) and incorrect handling of restore permissions (CWE-639).
Affected Systems
Vulnerable versions of the NATS-Server from nats-io include all releases prior to 2.11.15 on the 2.11.x branch and prior to 2.12.6 on the 2.12.x branch. The issue affects the Linux Foundation’s NATS Server, a high‑performance messaging platform used in cloud and edge environments.
Risk and Exploitability
The CVSS v3.1 score is 4.9, indicating moderate severity. The Exploit Prediction Scoring System estimates a less than 1 percent probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The likely attack path requires an attacker to already have JetStream restore permissions; broad or overly generous access increases risk. Updating the server or restricting restore rights mitigates the threat.
OpenCVE Enrichment
Github GHSA