CVE-2026-5507 PUBLISHED

Session Cache Restore — Arbitrary Free via Deserialized Pointer

Assigner: wolfSSL
Reserved: 03.04.2026 Published: 09.04.2026 Updated: 09.04.2026

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 4.1

Product Status

Vendor wolfSSL
Product wolfSSL
Versions Default: unaffected
  • affected from 0 to 5.9.0 (incl.)

Credits

  • Sunwoo Lee (Korea Institute of Energy Technology, KENTECH) finder
  • Woohyun Choi (Korea Institute of Energy Technology, KENTECH) finder
  • Seunghyun Yoon (Korea Institute of Energy Technology, KENTECH) finder

References

Problem Types

  • CWE-502 Deserialization of untrusted data CWE