CVE-2026-33223
Identity Spoofing via Incomplete Header Stripping in NATS-Server
Publication date: 2026-03-25
Last updated on: 2026-03-26
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linuxfoundation | nats-server | From 2.12.0 (inc) to 2.12.6 (exc) |
| linuxfoundation | nats-server | to 2.11.15 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an attacker with valid client credentials to spoof identity information in the NATS message header, potentially misleading services that rely on this header for authentication or authorization.
Such identity spoofing could lead to unauthorized access or actions, which may impact the confidentiality and integrity of data handled by affected systems.
While the CVE description and resources do not explicitly mention compliance with standards like GDPR or HIPAA, the potential for unauthorized access and data integrity issues could pose risks to meeting the security and privacy requirements mandated by these regulations.
Organizations using affected versions of NATS-server should consider this vulnerability when assessing their compliance posture, as exploitation could lead to violations of data protection and access control policies required by common standards.
Can you explain this vulnerability to me?
CVE-2026-33223 is a vulnerability in the NATS.io server, a high-performance messaging system used in cloud, on-premise, IoT, and edge computing environments. The issue lies in the handling of the internal message header `Nats-Request-Info:`, which is supposed to provide a trusted identity assertion by the NATS server for incoming requests.
In affected versions (up to and including 2.12.5 and 2.11.14), the server did not fully strip this header from inbound messages. This flaw allows an attacker who has valid credentials for any regular client interface to spoof the identity information contained in this header.
As a result, services that rely on the authenticity of the `Nats-Request-Info` header for identity verification can be deceived, potentially leading to unauthorized actions or access.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker with valid client credentials to spoof their identity to services that rely on the `Nats-Request-Info` header for authentication or authorization.
Such spoofing can mislead these services into granting unauthorized access or performing unauthorized actions, potentially compromising the integrity and confidentiality of your system.
- Attack can be performed remotely over the network.
- Requires only low privileges (valid client credentials).
- No user interaction is needed.
- The impact includes limited data disclosure and limited data modification, but no impact on availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the incomplete stripping of the `Nats-Request-Info:` header from inbound messages in affected nats-server versions. Detection would involve monitoring network traffic or server logs for inbound messages containing the `Nats-Request-Info:` header originating from clients, which should normally be stripped by the server.
Since the vulnerability requires valid client credentials and involves spoofing this header, you can inspect message headers in your NATS server logs or capture network packets to identify unexpected or suspicious `Nats-Request-Info:` headers in inbound messages.
Specific commands are not provided in the available resources, but general approaches include using packet capture tools like tcpdump or Wireshark to filter for NATS protocol traffic and inspect message headers, or enabling detailed logging on the NATS server to audit inbound message headers.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to upgrade the nats-server to a fixed version: either 2.11.15 or 2.12.6 or later, where the vulnerability has been addressed.
No known workarounds are available, so applying the official patch or upgrading to a secure version is essential to prevent attackers from spoofing the `Nats-Request-Info:` header.