CVE-2026-40303
zrok allows unauthenticated DoS via unbounded memory allocation in striped session cookie parsing
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, endpoints.GetSessionCookie parses an attacker-supplied cookie chunk count and calls make([]string, count) with no upper bound before any token validation occurs. The function is reached on every request to an OAuth-protected proxy share, allowing an unauthenticated remote attacker to trigger gigabyte-scale heap allocations per request, leading to process-level OOM termination or repeated goroutine panics. Both publicProxy and dynamicProxy are affected. Version 2.0.1 patches the issue.
| CWE | CWE-400 CWE-789 |
| Vendor | openziti |
| Product | zrok |
| Published | Apr 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for openziti zrok
Be the first to know when new high vulnerabilities affecting openziti zrok are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Affected Versions
openziti / zrok
< 2.0.1