CVE-2026-5507
Use-After-Free Vulnerability in Session Cache Restoration
Publication date: 2026-04-09
Last updated on: 2026-04-29
Assigner: wolfSSL Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wolfssl | wolfssl | to 5.9.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs when restoring a session from cache. The process uses a pointer from the serialized session data in a free operation without validating it first. An attacker who can poison the session cache by injecting a crafted session could trigger an arbitrary free operation, potentially leading to memory corruption or other unintended behavior.
Exploitation requires the attacker to be able to inject a malicious session into the cache and for the application to call specific session restore APIs that use this vulnerable free operation.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to cause an arbitrary free operation in memory, which may lead to memory corruption, application crashes, or potentially enable further exploitation such as code execution or denial of service.
However, exploitation requires the attacker to have the ability to inject crafted sessions into the cache and for the application to invoke specific session restore APIs, which may limit the attack surface.