Description
When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/10088 |
|
History
Thu, 09 Apr 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs. | |
| Title | Session Cache Restore — Arbitrary Free via Deserialized Pointer | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-04-09T22:18:44.067Z
Reserved: 2026-04-03T16:40:00.883Z
Link: CVE-2026-5507
No data.
Status : Received
Published: 2026-04-09T23:17:01.543
Modified: 2026-04-09T23:17:01.543
Link: CVE-2026-5507
No data.
OpenCVE Enrichment
No data.
Weaknesses