CVE-2026-33219: NATS is vulnerable to pre-auth DoS through WebSockets client service
(updated )
Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server offers a WebSockets client service, used in deployments where browsers are the NATS clients.
Problem Description
A malicious client which can connect to the WebSockets port can cause unbounded memory use in the nats-server before authentication; this requires sending a corresponding amount of data.
This is a milder variant of NATS-advisory-ID 2026-02 (aka CVE-2026-27571; GHSA-qrvq-68c2-7grw). That earlier issue was a compression bomb, this vulnerability is not. Attacks against this new issue thus require significant client bandwidth.
Affected Versions
Any version before v2.12.6 or v2.11.15
Workarounds
Disable websockets if not required for project deployment.
References
- advisories.nats.io/CVE/secnote-2026-02.txt
- advisories.nats.io/CVE/secnote-2026-11.txt
- github.com/advisories/GHSA-8r68-gvr4-jh7j
- github.com/advisories/GHSA-qrvq-68c2-7grw
- github.com/nats-io/nats-server
- github.com/nats-io/nats-server/security/advisories/GHSA-8r68-gvr4-jh7j
- nvd.nist.gov/vuln/detail/CVE-2026-33219
Code Behaviors & Features
Detect and mitigate CVE-2026-33219 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →