๐Ÿ” CVE Alert

CVE-2026-8741

LOW 3.1

EMQX QoS 2 PUBLISH Packet emqx_persistent_session_ds.erl race condition

CVSS Score
3.1
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability has been found in EMQX up to 6.2.0. This affects an unknown function of the file apps/emqx/src/emqx_persistent_session_ds.erl of the component QoS 2 PUBLISH Packet Handler. Such manipulation leads to race condition. The attack may be performed from remote. A high complexity level is associated with this attack. The exploitability is reported as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure.

CWE CWE-362
Vendor n/a
Product emqx
Published May 17, 2026
Last Updated May 18, 2026
Stay Ahead of the Next One

Get instant alerts for n/a emqx

Be the first to know when new low vulnerabilities affecting n/a emqx are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

n/a / EMQX
6.0 6.1 6.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/364329 vuldb.com: https://vuldb.com/vuln/364329/cti vuldb.com: https://vuldb.com/submit/809931 github.com: https://github.com/Pathfind-tama/Report_EMQX_MQTT github.com: https://github.com/Pathfind-tama/Report_EMQX_MQTT/blob/main/MQTT%20QoS%202%20Message%20Duplication%20in%20Persistent%20Sessions.md

Credits

๐Ÿ” CCCaaa (VulDB User) VulDB CNA Team