CVE-2026-21438
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit this vulnerability to overwhelm a system by repeatedly opening and closing WebTransport streams, which leads to excessive memory use because the system fails to properly clean up closed streams. This issue occurs in versions prior to 0.10.0, so updating to the latest version is essential to prevent this problem.
Technical Description
webtransport-go is an implementation of the WebTransport protocol. Prior to 0.10.0, an attacker can cause unbounded memory consumption repeatedly creating and closing many WebTransport streams. Closed streams were not removed from an internal session map, preventing garbage collection of their resources. This vulnerability is fixed in v0.10.0.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 12, 2026
8 days ago
Last Modified
Feb 13, 2026
8 days ago