CVE-2026-33216
ADVISORY - githubSummary
Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The nats-server provides an MQTT client interface.
Problem Description
For MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating identity statement (JWT) and exposed via monitoring endpoints.
Affected Versions
Any version before v2.12.6 or v2.11.15
Workarounds
Ensure monitoring end-points are adequately secured.
Best practice remains to not expose the monitoring endpoint to the Internet or other untrusted network users.
Common Weakness Enumeration (CWE)
Plaintext Storage of a Password
Plaintext Storage of a Password
Exposure of Sensitive Information Due to Incompatible Policies
NIST
3.9
CVSS SCORE
8.6highGitHub
3.9
CVSS SCORE
8.6highAlpine
-
Debian
-
Ubuntu
3.9
CVSS SCORE
7.5mediumGoLang
-
Bitnami
BIT-nats-2026-33216
3.9
CVSS SCORE
7.5highRed Hat
3.9
CVSS SCORE
8.6highChainguard
CGA-gv74-v2hj-r74x
-
minimos
MINI-jwrg-j6jr-396h
-