VYPR
Medium severity4.0NVD Advisory· Published Apr 9, 2026· Updated Apr 29, 2026

CVE-2026-5507

CVE-2026-5507

Description

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.

Affected products

1
  • cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*
    Range: <=5.9.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.