CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 24, 2026

CVE-2026-6993 | go-kratos up to 2.9.2 http.DefaultServeMux Fallback transport/http/server.go NewServer confused deputy (Issue 3810)

VulDB Archived Apr 24, 2026 ✓ Full text saved

A vulnerability labeled as problematic has been found in go-kratos kratos up to 2.9.2 . This impacts the function NewServer of the file transport/http/server.go of the component http.DefaultServeMux Fallback Handler . The manipulation results in unintended intermediary. This vulnerability is cataloged as CVE-2026-6993 . The attack may be launched remotely. Furthermore, there is an exploit available. Applying a patch is advised to resolve this issue.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-359545 · SUBMIT #797099 · CVE-2026-6993 GO-KRATOS UP TO 2.9.2 HTTP.DEFAULTSERVEMUX FALLBACK TRANSPORT/HTTP/SERVER.GO NEWSERVER CONFUSED DEPUTY HISTORYDIFFRELATEJSONXMLCTI Summaryinfo A vulnerability marked as problematic has been reported in go-kratos kratos up to 2.9.2. Affected is the function NewServer of the file transport/http/server.go of the component http.DefaultServeMux Fallback Handler. This manipulation causes confused deputy. This vulnerability is registered as CVE-2026-6993. Remote exploitation of the attack is possible. Furthermore, an exploit is available. It is suggested to install a patch to address this issue. Detailsinfo A vulnerability has been found in go-kratos kratos up to 2.9.2 and classified as problematic. Affected by this vulnerability is the function NewServer of the file transport/http/server.go of the component http.DefaultServeMux Fallback Handler. The manipulation with an unknown input leads to a confused deputy vulnerability. The CWE definition for the vulnerability is CWE-441. The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor. As an impact it is known to affect confidentiality. The advisory is shared at github.com. This vulnerability is known as CVE-2026-6993. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details and also a public exploit are known. It is possible to download the exploit at github.com. It is declared as proof-of-concept. Applying the patch 0284a5bcf92b5a7ee015300ce3051baf7ae4718d is able to eliminate this problem. The bugfix is ready for download at github.com. Productinfo Vendor go-kratos Name kratos Version 2.9.0 2.9.1 2.9.2 License open-source Website Product: https://github.com/go-kratos/kratos/ CPE 2.3info 🔒 🔒 🔒 CPE 2.2info 🔒 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 5.3 VulDB Meta Temp Score: 4.8 VulDB Base Score: 5.3 VulDB Temp Score: 4.8 VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Confused deputy CWE: CWE-441 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Yes Availability: 🔒 Access: Public Status: Proof-of-Concept Download: 🔒 Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Patch Status: 🔍 0-Day Time: 🔒 Patch: 0284a5bcf92b5a7ee015300ce3051baf7ae4718d Timelineinfo 04/24/2026 Advisory disclosed 04/24/2026 +0 days VulDB entry created 04/24/2026 +0 days VulDB entry last update Sourcesinfo Product: github.com Advisory: 3810 Status: Confirmed Confirmation: 🔒 CVE: CVE-2026-6993 (🔒) GCVE (CVE): GCVE-0-2026-6993 GCVE (VulDB): GCVE-100-359545 scip Labs: https://www.scip.ch/en/?labs.20161013 Entryinfo Created: 04/24/2026 21:48 Changes: 04/24/2026 21:48 (61) Complete: 🔍 Submitter: Yu_Bao Cache ID: 99:709:101 Submitinfo Accepted Submit #797099: go-kratos kratos 2.9.2 Unintended Route Exposure via DefaultServeMux Fallback (by Yu_Bao) Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 24, 2026
    Archived
    Apr 24, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗