CVE-2026-5507
Received Received - Intake
Use-After-Free Vulnerability in Session Cache Restoration

Publication date: 2026-04-09

Last updated on: 2026-04-29

Assigner: wolfSSL Inc.

Description
When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wolfssl wolfssl to 5.9.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs when restoring a session from cache. The process uses a pointer from the serialized session data in a free operation without validating it first. An attacker who can poison the session cache by injecting a crafted session could trigger an arbitrary free operation, potentially leading to memory corruption or other unintended behavior.

Exploitation requires the attacker to be able to inject a malicious session into the cache and for the application to call specific session restore APIs that use this vulnerable free operation.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to cause an arbitrary free operation in memory, which may lead to memory corruption, application crashes, or potentially enable further exploitation such as code execution or denial of service.

However, exploitation requires the attacker to have the ability to inject crafted sessions into the cache and for the application to invoke specific session restore APIs, which may limit the attack surface.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart