CVE-2026-5507
EUVD-2026-2121609.04.2026, 23:17
When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.Enginsight
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
| Vendor | Product | Version | Source |
|---|---|---|---|
| wolfssl | wolfssl | 𝑥 ≤ 5.9.0 | CNA |
Debian Releases
Ubuntu Releases
Common Weakness Enumeration