Home

Description

A vulnerability has been found in EMQX up to 6.2.0. This affects an unknown function of the file apps/emqx/src/emqx_persistent_session_ds.erl of the component QoS 2 PUBLISH Packet Handler. Such manipulation leads to race condition. The attack may be performed from remote. A high complexity level is associated with this attack. The exploitability is reported as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure.

PUBLISHED Reserved 2026-05-16 | Published 2026-05-17 | Updated 2026-05-18 | Assigner VulDB




LOW: 2.3CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
LOW: 3.1CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
LOW: 3.1CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
2.1AV:N/AC:H/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR

Problem types

Race Condition

Timeline

2026-05-16:Advisory disclosed
2026-05-16:VulDB entry created
2026-05-16:VulDB entry last update

Credits

CCCaaa (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/364329 (VDB-364329 | EMQX QoS 2 PUBLISH Packet emqx_persistent_session_ds.erl race condition) vdb-entry

vuldb.com/vuln/364329/cti (VDB-364329 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/submit/809931 (Submit #809931 | EMQX EMQX Broker EMQX 6.1.0 (confirmed) Race Condition) third-party-advisory

github.com/Pathfind-tama/Report_EMQX_MQTT related

github.com/... Message Duplication in Persistent Sessions.md exploit

cve.org (CVE-2026-8741)

nvd.nist.gov (CVE-2026-8741)

Download JSON