VYPR
High severityOSV Advisory· Published Mar 7, 2021· Updated Sep 16, 2024

Denial of Service (DoS)

CVE-2020-28466

Description

This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers: Running a NATS service which is exposed to untrusted users presents a heightened risk. Any remote execution flaw or equivalent seriousness, or denial-of-service by unauthenticated users, will lead to prompt releases by the NATS maintainers. Fixes for denial of service issues with no threat of remote execution, when limited to account holders, are likely to just be committed to the main development branch with no special attention. Those who are running such services are encouraged to build regularly from git.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Service export/import cycles between accounts in NATS server allow unauthenticated users to crash the server via crafted account JWTs.

Vulnerability

CVE-2020-28466 is a denial-of-service vulnerability in NATS server caused by cyclic service export/import configurations between accounts. The server fails to detect cycles when processing account JWTs, leading to a crash [1][2].

Exploitation

An attacker who controls an account JWT can define a service export that imports from another account, which in turn imports back, creating a loop. This can be triggered without authentication if the server permits untrusted accounts [3][4].

Impact

Successful exploitation results in a server crash, denying service to all connected clients. The vulnerability is classified as a denial-of-service with no remote code execution risk [1][3].

Mitigation

The issue is fixed in NATS server version 2.2.0. The fix was committed to the main development branch earlier but only released with 2.2.0. Maintainers recommend building regularly from git for those running services exposed to untrusted users [3][4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/nats-io/nats-serverGo
< 2.2.02.2.0
github.com/nats-io/nats-server/v2Go
< 2.2.02.2.0

Affected products

8

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.