Unrated severityNVD Advisory· Published Mar 26, 2026· Updated Mar 26, 2026
EVerest has race-condition-induced std::map corruption in OCPP 1.6 evse_soc_map
CVE-2026-26072
Description
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to std::map<std::optional> concurrent access (container/optional corruption possible). The trigger is EV SoC update with powermeter periodic update and unplugging/SessionFinished status. Version 2026.02.0 patches the issue.
Affected products
1- Range: < 2026.02.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/EVerest/EVerest/security/advisories/GHSA-9xwc-49c4-p79vmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.