NATS is vulnerable to pre-auth DoS through WebSockets client service
Moderate severity
GitHub Reviewed
Published
Mar 24, 2026
in
nats-io/nats-server
•
Updated Mar 24, 2026
Package
Affected versions
< 2.11.15
>= 2.12.0-RC.1, < 2.12.6
Patched versions
2.11.15
2.12.6
Description
Published to the GitHub Advisory Database
Mar 24, 2026
Reviewed
Mar 24, 2026
Last updated
Mar 24, 2026
Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server offers a WebSockets client service, used in deployments where browsers are the NATS clients.
Problem Description
A malicious client which can connect to the WebSockets port can cause unbounded memory use in the nats-server before authentication; this requires sending a corresponding amount of data.
This is a milder variant of NATS-advisory-ID 2026-02 (aka CVE-2026-27571; GHSA-qrvq-68c2-7grw).
That earlier issue was a compression bomb, this vulnerability is not. Attacks against this new issue thus require significant client bandwidth.
Affected Versions
Any version before v2.12.6 or v2.11.15
Workarounds
Disable websockets if not required for project deployment.
References