


Perceptive Security
SOC/SIEM Consultancy

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using…
Published:
24 March 2026 at 23:00:00
Alert date:
25 March 2026 at 21:04:01
Source:
nvd.nist.gov
Email & Messaging, Identity & Access
NATS-Server, a high-performance messaging system server, contains a vulnerability where MQTT passwords are incorrectly classified as non-authenticating JWT statements and exposed through monitoring endpoints. The issue affects versions prior to 2.11.15 and 2.12.6. Fixed versions 2.11.14 and 2.12.6 are available. As a workaround, organizations should secure monitoring endpoints and avoid exposing them to untrusted networks. The vulnerability specifically impacts MQTT deployments using username/password authentication.
Technical details
Mitigation steps:
Affected products:
NATS-Server
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-33216
https://advisories.nats.io/CVE/secnote-2026-05.txt
https://github.com/nats-io/nats-server/commit/b5b63cfc35a57075e09c1f57503d31721bed8099
https://github.com/nats-io/nats-server/security/advisories/GHSA-v722-jcv5-w7mc
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
