Description
OpenTelemetry-Go is the Go implementation of OpenTelemetry. Prior to 1.43.0, the otlp HTTP exporters (traces/metrics/logs) read the full HTTP response body into an in-memory bytes.Buffer without a size cap. This is exploitable for memory exhaustion when the configured collector endpoint is attacker-controlled (or a network attacker can mitm the exporter connection). This vulnerability is fixed in 1.43.0.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

OpenTelemetry-Go's OTLP HTTP exporters read the entire HTTP response body into an in-memory buffer without a size limit. This results in uncontrolled memory consumption when the collector endpoint is controlled by an attacker or can be MITM, potentially exhausting system memory and causing a denial of service. An attacker can trigger the issue by directing the exporter to a malicious or spoofed endpoint that sends large body payloads, or by intercepting the network traffic to inject a similarly large response. The flaw exemplifies a CWE-789 vulnerability where unbounded data is accepted. The impact is a local denial of service on any system running the exporter, which could interrupt telemetry collection and affect system availability.

Affected Systems

OpenTelemetry-Go, the Go implementation of OpenTelemetry, is affected in all versions prior to 1.43.0. Users running any of those versions with OTLP HTTP exporters for traces, metrics, or logs are vulnerable. The product is identified as open-telemetry:opentelemetry-go. No specific patch versions beyond 1.43.0 are listed in the advisory.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity vulnerability. An EPSS score of less than 1% suggests a low probability of exploitation. It is not listed in the CISA KEV catalogue. Exploitation requires the ability to control or intercept the collector endpoint, which typically involves remote or network-level access. The vulnerability can lead to a local denial of service, which may be significant in systems requiring high availability.

Generated by OpenCVE AI on April 9, 2026 at 19:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to opentelemetry-go version 1.43.0 or newer.
  • Ensure the collector endpoint is secure and not controlled by an adversary.
  • Monitor memory usage of exporter processes for sudden growth.
  • If upgrading immediately is not possible, consider network-level controls to limit response sizes.

Generated by OpenCVE AI on April 9, 2026 at 19:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w8rr-5gcm-pp58 opentelemetry-go: OTLP HTTP exporters read unbounded HTTP response bodies
History

Fri, 10 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Opentelemetry opentelemetry
CPEs cpe:2.3:a:opentelemetry:opentelemetry:*:*:*:*:*:go:*:*
Vendors & Products Opentelemetry opentelemetry

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Opentelemetry
Opentelemetry opentelemetry-go
Vendors & Products Opentelemetry
Opentelemetry opentelemetry-go

Wed, 08 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description OpenTelemetry-Go is the Go implementation of OpenTelemetry. Prior to 1.43.0, the otlp HTTP exporters (traces/metrics/logs) read the full HTTP response body into an in-memory bytes.Buffer without a size cap. This is exploitable for memory exhaustion when the configured collector endpoint is attacker-controlled (or a network attacker can mitm the exporter connection). This vulnerability is fixed in 1.43.0.
Title OpenTelemetry-Go OTLP HTTP exporters read unbounded HTTP response bodies
Weaknesses CWE-789
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Opentelemetry Opentelemetry Opentelemetry-go
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-09T20:22:03.109Z

Reserved: 2026-04-07T20:32:03.010Z

Link: CVE-2026-39882

cve-icon Vulnrichment

Updated: 2026-04-09T20:21:56.599Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T21:17:00.547

Modified: 2026-04-09T18:39:55.730

Link: CVE-2026-39882

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:40:34Z

Weaknesses