Back to list

OpAMP client reads unbounded HTTP response bodies — CVE-2026-42348

GitHub · GitHub · CVE-2026-42348

ID
CVE-2026-42348
Date
Updated
Activity
Source
GitHub
Vendor
GitHub
Threat
medium
CVSS
5.9
EPSS
0.0004

Summary

### Summary When receiving responses from the OpAMP server over HTTP, the OpAMP client allocates an unbounded buffer to read all bytes from the server, with no upper-bound on the number of bytes consumed. This could cause memory exhaustion in the consuming application if the configured OpAMP server is attacker-controlled (or a network attacker can MitM the connection) and an extremely large body is returned in the…

Product

nuget: OpenTelemetry.OpAmp.Client

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories