๐Ÿ” CVE Alert

CVE-2026-42855

HIGH 7.5

arduino-esp32: Digest authentication URI mismatch bypass in WebServer allows cross-resource replay attack

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
13th

arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. Prior to 3.3.8, the WebServer Digest authentication implementation in arduino-esp32 computes the authentication hash using the URI field from the client's Authorization header, without verifying that it matches the actual requested URI. This allows an attacker who possesses any valid digest response (computed for URI-A) to authenticate requests to a completely different protected URI (URI-B), bypassing per-resource access control. This vulnerability is fixed in 3.3.8.

CWE CWE-287
Vendor espressif
Product arduino-esp32
Published May 12, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for espressif arduino-esp32

Be the first to know when new high vulnerabilities affecting espressif arduino-esp32 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

espressif / arduino-esp32
< 3.3.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/espressif/arduino-esp32/security/advisories/GHSA-28hv-fwm3-rpcq