NATS Server Security Patch: CVE-2026-33249 Allows Unauthorized Message Trace Redirection
A critical security vulnerability in the NATS.io messaging server allows authenticated clients to redirect internal trace messages to any subject, bypassing standard publish permissions. The flaw, tracked as CVE-2026-33249, is present in versions prior to 2.12.6 and 2.11.15. While the payload is limited to valid trace data and not arbitrary attacker content, the ability to redirect these messages to unauthorized subjects represents a significant breach of the system's intended access controls and internal trust boundaries.
The vulnerability specifically impacts the NATS Server, a high-performance open-source technology used for cloud, on-premise, IoT, and edge communication. The issue stems from improper validation of message tracing headers. A client with valid credentials can exploit this to specify that trace messages be sent to a subject for which it lacks explicit publish permissions. A separate, related vulnerability, CVE-2026-33247, is also addressed in the same patch release, though details are less specified in the current advisory.
The maintainers have released patches in versions 2.12.6 and 2.11.15. The advisory explicitly states there are no safe workarounds, forcing an immediate upgrade for all deployments. This creates urgent operational pressure for organizations relying on NATS for critical pub-sub communication, as the flaw could be leveraged to exfiltrate internal system state or disrupt monitoring flows within a secured environment.