Description
Micronaut Framework is a JVM-based full stack Java framework designed for building modular, easily testable JVM applications. Prior to 4.10.22, the bundleCache is keyed by (Locale, baseName) where the locale originates from the HTTP Accept-Language header. In applications that explicitly register a ResourceBundleMessageSource bean and serve HTML error responses, an unauthenticated attacker can exhaust heap memory by sending requests with large numbers of unique Accept-Language values, each causing a new entry in the unbounded bundleCache. This vulnerability is fixed in 4.10.22.
Published: 2026-05-12
Score: 3.7 Low
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An unbounded bundleCache in Micronaut Framework’s ResourceBundleMessageSource allows an unauthenticated attacker to exhaust heap memory by sending HTTP requests with a large number of unique Accept-Language header values. Each distinct value creates a new cache entry keyed by (Locale, baseName), and since the cache is unbounded, repeated requests can consume all available memory, causing the application to become unresponsive or terminate. This flaw is categorized as CWE-400, representing uncontrolled resource consumption.

Affected Systems

The vulnerability affects deployments of micronaut-core before version 4.10.22 where a ResourceBundleMessageSource bean is explicitly registered and the application serves HTML error responses. Applications built on Micronaut Framework that include this bean and expose Accept‑Language processing fall within the impact scope.

Risk and Exploitability

The CVSS score of 3.7 indicates a moderate severity, primarily due to the denial‑of‑service impact and lack of privileged escalation or data exfiltration. EPSS data is unavailable, so the likelihood of exploitation cannot be quantified, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is via any HTTP request with a crafted Accept‑Language header; no authentication or special network conditions are required. Attackers can achieve service disruption by exhausting heap memory, which may further affect co‑resident processes or trigger heap dumps that expose sensitive data during crash analysis.

Generated by OpenCVE AI on May 12, 2026 at 23:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Micronaut-core to 4.10.22 or newer
  • If an upgrade is not immediately possible, remove or disable automatic registration of the ResourceBundleMessageSource bean or turn off HTML error page generation for the affected routes
  • Configure the application firewall or web server to restrict the Accept-Language header to a predefined list of locales and rate‑limit repeated header values to mitigate excessive cache growth

Generated by OpenCVE AI on May 12, 2026 at 23:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3rfq-4wpf-qqw3 Micronaut has Unbounded `bundleCache` in `ResourceBundleMessageSource` that Allows Memory Exhaustion via `Accept-Language` Header
History

Wed, 13 May 2026 00:15:00 +0000

Type Values Removed Values Added
First Time appeared Micronaut-projects
Micronaut-projects micronaut-core
Vendors & Products Micronaut-projects
Micronaut-projects micronaut-core

Tue, 12 May 2026 22:00:00 +0000

Type Values Removed Values Added
Description Micronaut Framework is a JVM-based full stack Java framework designed for building modular, easily testable JVM applications. Prior to 4.10.22, the bundleCache is keyed by (Locale, baseName) where the locale originates from the HTTP Accept-Language header. In applications that explicitly register a ResourceBundleMessageSource bean and serve HTML error responses, an unauthenticated attacker can exhaust heap memory by sending requests with large numbers of unique Accept-Language values, each causing a new entry in the unbounded bundleCache. This vulnerability is fixed in 4.10.22.
Title Micronaut Framework: Unbounded bundleCache in ResourceBundleMessageSource Allows Memory Exhaustion via Accept-Language Header
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Micronaut-projects Micronaut-core
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T21:17:52.609Z

Reserved: 2026-05-05T15:42:40.520Z

Link: CVE-2026-44242

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T22:16:35.617

Modified: 2026-05-12T22:16:35.617

Link: CVE-2026-44242

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T00:00:16Z

Weaknesses