Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/nats-io/nats-server/v2
  4. ›
  5. CVE-2026-33247

CVE-2026-33247: NATS credentials are exposed in monitoring port via command-line argv

March 24, 2026 (updated March 27, 2026)

Background

NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.

The nats-server provides an optional monitoring port, which provides access to sensitive data. The nats-server can take certain configuration options on the command-line instead of requiring a configuration file.

Problem Description

If a nats-server is run with static credentials for all clients provided via argv (the command-line), then those credentials are visible to any user who can see the monitoring port, if that too is enabled.

The /debug/vars end-point contains an unredacted copy of argv.

Patches

Fixed in nats-server 2.12.6 & 2.11.15

Workarounds

The NATS Maintainers are bemused at the concept of someone deploying a real configuration using --pass to avoid a config file, but also enabling monitoring.

Configure credentials inside a configuration file instead of via argv.

Do not enable the monitoring port if using secrets in argv.

Best practice remains to not expose the monitoring port to the Internet, or to untrusted network sources.

References

  • advisories.nats.io/CVE/secnote-2026-14.txt
  • github.com/advisories/GHSA-x6g4-f6q3-fqvv
  • github.com/nats-io/nats-server
  • github.com/nats-io/nats-server/security/advisories/GHSA-x6g4-f6q3-fqvv
  • nvd.nist.gov/vuln/detail/CVE-2026-33247
  • pkg.go.dev/vuln/GO-2026-4827

Code Behaviors & Features

Detect and mitigate CVE-2026-33247 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.11.15, all versions starting from 2.12.0-RC.1 before 2.12.6

Fixed versions

  • 2.11.15
  • 2.12.6

Solution

Upgrade to versions 2.11.15, 2.12.6 or above.

Impact 7.4 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-215: Insertion of Sensitive Information Into Debugging Code

Source file

go/github.com/nats-io/nats-server/v2/CVE-2026-33247.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:11 +0000.