Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. io.vertx/vertx-core
  4. ›
  5. CVE-2026-6860

CVE-2026-6860: Vert.x has a DoS via unbounded server-side SNI SslContext cache growth

May 9, 2026

Potential unbounded server-side SNI SslContext cache growth in Vert.x TLS handling, with possible resource-exhaustion / DoS impact.

On affected versions, matching server-side SNI names are cached via computeIfAbsent(serverName, ...) in a serverName-keyed SslContext cache, and I could not find any bound, TTL, or eviction for that cache.

The implementation differs slightly by branch, but the same sink appears to be present in released versions 4.3.4 through 5.0.8:

  • 4.3.x: SSLHelper
  • 4.4.x / 4.5.x: SslChannelProvider
  • 5.0.x and current master: SslContextProvider

It appears that when server-side SNI is enabled, and wildcard or otherwise broad hostname mappings are used, an unauthenticated client can send many distinct matching SNI names and cause the server to retain increasing numbers of SslContext entries over time, leading to increasing memory consumption and possible DoS conditions.

A check was performed on the related TCP SNI path across affected versions, the QUIC SNI path on 5.x, and the wildcard hostname resolution helpers used during certificate selection.

References

  • github.com/advisories/GHSA-3g76-f9xq-8vp6
  • github.com/eclipse-vertx/vert.x
  • github.com/eclipse-vertx/vert.x/pull/6102
  • github.com/eclipse-vertx/vert.x/security/advisories/GHSA-3g76-f9xq-8vp6
  • gitlab.eclipse.org/security/vulnerability-reports/-/issues/381
  • nvd.nist.gov/vuln/detail/CVE-2026-6860

Code Behaviors & Features

Detect and mitigate CVE-2026-6860 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.3.4 up to 4.3.8, all versions starting from 4.4.0 up to 4.4.9, all versions starting from 4.5.0 up to 4.5.25, all versions starting from 5.0.0 up to 5.0.8

Solution

Unfortunately, there is no solution available yet.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Source file

maven/io.vertx/vertx-core/CVE-2026-6860.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:07 +0000.