Webtransport Go

3 CVEs product

Monthly

CVE-2026-21438 MEDIUM PATCH This Month

Webtransport-go versions prior to 0.10.0 fail to properly clean up closed WebTransport streams from internal session maps, allowing remote attackers to exhaust server memory through repeated stream creation and closure. This denial-of-service condition requires no authentication or user interaction and affects all deployments using the vulnerable library. A patch is available in version 0.10.0.

Golang Webtransport Go Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-21435 MEDIUM PATCH This Month

Webtransport-go versions prior to 0.10.0 are vulnerable to denial of service attacks where a malicious peer can withhold QUIC flow control credits to indefinitely block WebTransport session closure. An attacker can exploit this to hang close operations and prevent proper session termination, leaving connections in a suspended state. Affected applications using webtransport-go for protocol communication should upgrade to version 0.10.0 or later to mitigate this vulnerability.

Golang Denial Of Service Webtransport Go Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-21434 MEDIUM PATCH This Month

Webtransport-go versions 0.3.0 through 0.9.0 fail to enforce the 1024-byte limit on Application Error Messages in WT_CLOSE_SESSION capsules, allowing remote attackers to trigger unbounded memory consumption by sending oversized payloads. An unauthenticated attacker can exhaust server memory and cause denial of service, requiring only sufficient bandwidth to transmit the malicious payload. The vulnerability is resolved in version 0.10.0, though no patch is currently available for affected versions.

Golang Webtransport Go Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-21438
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Webtransport-go versions prior to 0.10.0 fail to properly clean up closed WebTransport streams from internal session maps, allowing remote attackers to exhaust server memory through repeated stream creation and closure. This denial-of-service condition requires no authentication or user interaction and affects all deployments using the vulnerable library. A patch is available in version 0.10.0.

Golang Webtransport Go Suse
NVD GitHub
CVE-2026-21435
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Webtransport-go versions prior to 0.10.0 are vulnerable to denial of service attacks where a malicious peer can withhold QUIC flow control credits to indefinitely block WebTransport session closure. An attacker can exploit this to hang close operations and prevent proper session termination, leaving connections in a suspended state. Affected applications using webtransport-go for protocol communication should upgrade to version 0.10.0 or later to mitigate this vulnerability.

Golang Denial Of Service Webtransport Go +1
NVD GitHub
CVE-2026-21434
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Webtransport-go versions 0.3.0 through 0.9.0 fail to enforce the 1024-byte limit on Application Error Messages in WT_CLOSE_SESSION capsules, allowing remote attackers to trigger unbounded memory consumption by sending oversized payloads. An unauthenticated attacker can exhaust server memory and cause denial of service, requiring only sufficient bandwidth to transmit the malicious payload. The vulnerability is resolved in version 0.10.0, though no patch is currently available for affected versions.

Golang Webtransport Go Suse
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy