CVE-2026-8741
EMQX QoS 2 PUBLISH Packet emqx_persistent_session_ds.erl race condition
CVSS Score
3.1
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability has been found in EMQX up to 6.2.0. This affects an unknown function of the file apps/emqx/src/emqx_persistent_session_ds.erl of the component QoS 2 PUBLISH Packet Handler. Such manipulation leads to race condition. The attack may be performed from remote. A high complexity level is associated with this attack. The exploitability is reported as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure.
| CWE | CWE-362 |
| Vendor | n/a |
| Product | emqx |
| Published | May 17, 2026 |
| Last Updated | May 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a emqx
Be the first to know when new low vulnerabilities affecting n/a emqx are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
n/a / EMQX
6.0 6.1 6.2.0
References
vuldb.com: https://vuldb.com/vuln/364329 vuldb.com: https://vuldb.com/vuln/364329/cti vuldb.com: https://vuldb.com/submit/809931 github.com: https://github.com/Pathfind-tama/Report_EMQX_MQTT github.com: https://github.com/Pathfind-tama/Report_EMQX_MQTT/blob/main/MQTT%20QoS%202%20Message%20Duplication%20in%20Persistent%20Sessions.md
Credits
๐ CCCaaa (VulDB User) VulDB CNA Team