Medium severity4.0NVD Advisory· Published Apr 9, 2026· Updated Apr 29, 2026
CVE-2026-5507
CVE-2026-5507
Description
When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/wolfSSL/wolfssl/pull/10088nvdIssue TrackingPatch
News mentions
0No linked articles in our index yet.