No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 17 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in EMQX up to 6.2.0. This affects an unknown function of the file apps/emqx/src/emqx_persistent_session_ds.erl of the component QoS 2 PUBLISH Packet Handler. Such manipulation leads to race condition. The attack may be performed from remote. A high complexity level is associated with this attack. The exploitability is reported as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure. | |
| Title | EMQX QoS 2 PUBLISH Packet emqx_persistent_session_ds.erl race condition | |
| First Time appeared |
Emqx
Emqx emqx |
|
| Weaknesses | CWE-362 | |
| CPEs | cpe:2.3:a:emqx:emqx:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Emqx
Emqx emqx |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-17T08:15:08.625Z
Reserved: 2026-05-16T11:19:08.422Z
Link: CVE-2026-8741
No data.
Status : Received
Published: 2026-05-17T09:16:35.013
Modified: 2026-05-17T09:16:35.013
Link: CVE-2026-8741
No data.
OpenCVE Enrichment
Updated: 2026-05-17T11:00:12Z