Vulnerability Description
A vulnerability has been found in EMQX up to 6.2.0. This affects an unknown function of the file apps/emqx/src/emqx_persistent_session_ds.erl of the component QoS 2 PUBLISH Packet Handler. Such manipulation leads to race condition. The attack may be performed from remote. A high complexity level is associated with this attack. The exploitability is reported as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emqx | Emqx | >= 5.0.0, <= 6.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/Pathfind-tama/Report_EMQX_MQTTThird Party Advisory
- https://github.com/Pathfind-tama/Report_EMQX_MQTT/blob/main/MQTT%20QoS%202%20MesThird Party AdvisoryExploitMitigation
- https://vuldb.com/submit/809931Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364329Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364329/ctiPermissions RequiredVDB Entry
FAQ
What is CVE-2026-8741?
CVE-2026-8741 is a vulnerability with a CVSS score of 3.1 (LOW). A vulnerability has been found in EMQX up to 6.2.0. This affects an unknown function of the file apps/emqx/src/emqx_persistent_session_ds.erl of the component QoS 2 PUBLISH Packet Handler. Such manipu...
How severe is CVE-2026-8741?
CVE-2026-8741 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8741?
Check the references section above for vendor advisories and patch information. Affected products include: Emqx Emqx.