Ghostwire

CVE-2026-5507: When restoring a session from cache, a pointer from the serialized session data is used in a free operation without...

MEDIUM CVSS 5.5 EPSS 0.02%

Published: April 9, 2026 | Last Modified: April 9, 2026

Description

When restoring a session from cache, a pointer from the serialized session data is used in a free operation without validation. An attacker who can poison the session cache could trigger an arbitrary free. Exploitation requires the ability to inject a crafted session into the cache and for the application to call specific session restore APIs.

Ghostwire Analysis — What This Means Practically

Exploitation Probability (EPSS): Low — 0.02% (4th percentile)

Low exploitation probability based on current threat landscape data. Standard patching timeline is appropriate.

This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.

Security Coverage (2 articles)

References