Vulnerability Description
EVerest is an EV charging software stack. Prior to version 2026.02.0, when WithdrawAuthorization is processed before the TransactionStarted event, AuthHandler determines `transaction_active=false` and only calls `withdraw_authorization_callback`. This path ultimately calls `Charger::deauthorize()`, but no actual stop (StopTransaction) occurs in the Charging state. As a result, authorization withdrawal can be defeated by timing, allowing charging to continue. Version 2026.02.0 contains a patch.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Everest | < 2026.02.0 |
Related Weaknesses (CWE)
References
- https://github.com/EVerest/EVerest/security/advisories/GHSA-gx37-p775-qf5vExploitVendor Advisory
FAQ
What is CVE-2026-29044?
CVE-2026-29044 is a vulnerability with a CVSS score of 5.0 (MEDIUM). EVerest is an EV charging software stack. Prior to version 2026.02.0, when WithdrawAuthorization is processed before the TransactionStarted event, AuthHandler determines `transaction_active=false` and...
How severe is CVE-2026-29044?
CVE-2026-29044 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-29044?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Everest.