Medium severity5.3NVD Advisory· Published Apr 8, 2026· Updated Apr 9, 2026
CVE-2026-39882
CVE-2026-39882
Description
OpenTelemetry-Go is the Go implementation of OpenTelemetry. Prior to 1.43.0, the otlp HTTP exporters (traces/metrics/logs) read the full HTTP response body into an in-memory bytes.Buffer without a size cap. This is exploitable for memory exhaustion when the configured collector endpoint is attacker-controlled (or a network attacker can mitm the exporter connection). This vulnerability is fixed in 1.43.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttpGo | < 1.43.0 | 1.43.0 |
go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttpGo | < 1.43.0 | 1.43.0 |
go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttpGo | < 0.19.0 | 0.19.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/open-telemetry/opentelemetry-go/pull/8108nvdPatchWEB
- github.com/advisories/GHSA-w8rr-5gcm-pp58ghsaADVISORY
- github.com/open-telemetry/opentelemetry-go/security/advisories/GHSA-w8rr-5gcm-pp58nvdThird Party AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-39882ghsaADVISORY
- github.com/open-telemetry/opentelemetry-go/releases/tag/v1.43.0ghsaWEB
News mentions
0No linked articles in our index yet.