Memory Allocation with Excessive Size Value (CWE-789) in the Prometheus remote_write HTTP handler in Metricbeat can lead Denial of Service via Excessive Allocation (CAPEC-130).

Project Subscriptions

No data.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5vrw-qjxw-89r5 Metricbeat Allocates Memory with Excessive Size Value Leading to Denial of Service
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 19 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description Memory Allocation with Excessive Size Value (CWE-789) in the Prometheus remote_write HTTP handler in Metricbeat can lead Denial of Service via Excessive Allocation (CAPEC-130).
Title Memory Allocation with Excessive Size Value in Metricbeat Leading to Denial of Service
Weaknesses CWE-789
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: elastic

Published:

Updated: 2026-03-19T17:20:38.549Z

Reserved: 2026-02-16T16:42:05.773Z

Link: CVE-2026-26931

cve-icon Vulnrichment

Updated: 2026-03-19T17:20:35.484Z

cve-icon NVD

Status : Received

Published: 2026-03-19T17:16:23.320

Modified: 2026-03-19T17:16:23.320

Link: CVE-2026-26931

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses