Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-52jh-2xxh-pwh6 | NATS Server panic via malicious compression on leafnode port |
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation nats-server |
|
| CPEs | cpe:2.3:a:linuxfoundation:nats-server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation nats-server |
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nats
Nats nats Server |
|
| Vendors & Products |
Nats
Nats nats Server |
Thu, 26 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-409 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 25 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash the nats-server by triggering a panic. This happens pre-authentication and requires that compression be enabled (which it is, by default, when leafnodes are used). Versions 2.11.14 and 2.12.5 contain a fix. As a workaround, disable compression on the leafnode port. | |
| Title | NATS Server panic via malicious compression on leafnode port | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-28T01:34:06.528Z
Reserved: 2026-03-04T16:26:02.899Z
Link: CVE-2026-29785
Updated: 2026-03-28T01:34:01.250Z
Status : Analyzed
Published: 2026-03-25T20:16:30.373
Modified: 2026-03-26T17:13:31.983
Link: CVE-2026-29785
OpenCVE Enrichment
Updated: 2026-03-27T09:30:15Z
Github GHSA