Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssl/pull/10088 |
|
Wed, 29 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 14 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssl
Wolfssl wolfssl |
|
| Vendors & Products |
Wolfssl
Wolfssl wolfssl |
Thu, 09 Apr 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs. | |
| Title | Session Cache Restore — Arbitrary Free via Deserialized Pointer | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-04-14T14:38:40.362Z
Reserved: 2026-04-03T16:40:00.883Z
Link: CVE-2026-5507
Updated: 2026-04-14T14:38:34.533Z
Status : Analyzed
Published: 2026-04-09T23:17:01.543
Modified: 2026-04-29T14:05:22.370
Link: CVE-2026-5507
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:27:37Z