A security flaw has been discovered in go-kratos kratos up to 2.9.2. This impacts the function NewServer of the file transport/http/server.go of the component http.DefaultServeMux Fallback Handler. The manipulation results in unintended intermediary. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The patch is identified as 0284a5bcf92b5a7ee015300ce3051baf7ae4718d. Applying a patch is advised to resolve this issue.

Project Subscriptions

Vendors Products
Go-kratos Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jj45-xvq5-rhh9 Kratos has a Confused Deputy issue
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 29 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-444
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Go-kratos
Go-kratos kratos
Vendors & Products Go-kratos
Go-kratos kratos

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 25 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in go-kratos kratos up to 2.9.2. This impacts the function NewServer of the file transport/http/server.go of the component http.DefaultServeMux Fallback Handler. The manipulation results in unintended intermediary. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The patch is identified as 0284a5bcf92b5a7ee015300ce3051baf7ae4718d. Applying a patch is advised to resolve this issue.
Title go-kratos http.DefaultServeMux Fallback server.go NewServer confused deputy
Weaknesses CWE-441
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:41:17.183Z

Reserved: 2026-04-24T19:43:37.550Z

Link: CVE-2026-6993

cve-icon Vulnrichment

Updated: 2026-04-27T13:41:10.305Z

cve-icon NVD

Status : Deferred

Published: 2026-04-25T19:16:00.177

Modified: 2026-04-27T18:42:11.700

Link: CVE-2026-6993

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-25T18:30:16Z

Links: CVE-2026-6993 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:30:07Z

Weaknesses