{"api_version":"1","generated_at":"2026-04-17T08:24:47+00:00","cve":"CVE-2026-34824","urls":{"html":"https://cve.report/CVE-2026-34824","api":"https://cve.report/api/cve/CVE-2026-34824.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-34824","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-34824"},"summary":{"title":"Mesop: Unbounded Thread Creation in WebSocket Handler Leads to Denial of Service","description":"Mesop is a Python-based UI framework that allows users to build web applications. From version 1.2.3 to before version 1.2.5, an uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unauthenticated attacker can send a rapid succession of WebSocket messages, forcing the server to spawn an unbounded number of operating system threads. This leads to thread exhaustion and Out of Memory (OOM) errors, causing a complete Denial of Service (DoS) for any application built on the framework. This issue has been patched in version 1.2.5.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-03 23:17:05","updated_at":"2026-04-13 17:28:47"},"problem_types":["CWE-125","CWE-770","CWE-125 CWE-125: Out-of-bounds Read"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/mesop-dev/mesop/commit/760a2079b5c609038c826d24dfbcf9b0be98d987","name":"https://github.com/mesop-dev/mesop/commit/760a2079b5c609038c826d24dfbcf9b0be98d987","refsource":"security-advisories@github.com","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/mesop-dev/mesop/security/advisories/GHSA-3jr7-6hqp-x679","name":"https://github.com/mesop-dev/mesop/security/advisories/GHSA-3jr7-6hqp-x679","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Mitigation","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/mesop-dev/mesop/releases/tag/v1.2.5","name":"https://github.com/mesop-dev/mesop/releases/tag/v1.2.5","refsource":"security-advisories@github.com","tags":["Product","Release Notes"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-34824","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34824","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"mesop-dev","product":"mesop","version":"affected >= 1.2.3, < 1.2.5","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"34824","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mesop-dev","cpe5":"mesop","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"python","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"34824","cve":"CVE-2026-34824","epss":"0.000490000","percentile":"0.149330000","score_date":"2026-04-15","updated_at":"2026-04-16 00:13:56"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-34824","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-06T15:36:21.198461Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-06T15:42:06.793Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/mesop-dev/mesop/security/advisories/GHSA-3jr7-6hqp-x679"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"mesop","vendor":"mesop-dev","versions":[{"status":"affected","version":">= 1.2.3, < 1.2.5"}]}],"descriptions":[{"lang":"en","value":"Mesop is a Python-based UI framework that allows users to build web applications. From version 1.2.3 to before version 1.2.5, an uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unauthenticated attacker can send a rapid succession of WebSocket messages, forcing the server to spawn an unbounded number of operating system threads. This leads to thread exhaustion and Out of Memory (OOM) errors, causing a complete Denial of Service (DoS) for any application built on the framework. This issue has been patched in version 1.2.5."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-125","description":"CWE-125: Out-of-bounds Read","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-03T22:41:34.828Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/mesop-dev/mesop/security/advisories/GHSA-3jr7-6hqp-x679","tags":["x_refsource_CONFIRM"],"url":"https://github.com/mesop-dev/mesop/security/advisories/GHSA-3jr7-6hqp-x679"},{"name":"https://github.com/mesop-dev/mesop/commit/760a2079b5c609038c826d24dfbcf9b0be98d987","tags":["x_refsource_MISC"],"url":"https://github.com/mesop-dev/mesop/commit/760a2079b5c609038c826d24dfbcf9b0be98d987"},{"name":"https://github.com/mesop-dev/mesop/releases/tag/v1.2.5","tags":["x_refsource_MISC"],"url":"https://github.com/mesop-dev/mesop/releases/tag/v1.2.5"}],"source":{"advisory":"GHSA-3jr7-6hqp-x679","discovery":"UNKNOWN"},"title":"Mesop: Unbounded Thread Creation in WebSocket Handler Leads to Denial of Service"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-34824","datePublished":"2026-04-03T22:41:34.828Z","dateReserved":"2026-03-30T20:52:53.283Z","dateUpdated":"2026-04-06T15:42:06.793Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-03 23:17:05","lastModifiedDate":"2026-04-13 17:28:47","problem_types":["CWE-125","CWE-770","CWE-125 CWE-125: Out-of-bounds Read"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mesop-dev:mesop:*:*:*:*:*:python:*:*","versionStartIncluding":"1.2.3","versionEndExcluding":"1.2.5","matchCriteriaId":"4769E8D1-F88C-4A75-8FAF-134F1A0B7DE0"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"34824","Ordinal":"1","Title":"Mesop: Unbounded Thread Creation in WebSocket Handler Leads to D","CVE":"CVE-2026-34824","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"34824","Ordinal":"1","NoteData":"Mesop is a Python-based UI framework that allows users to build web applications. From version 1.2.3 to before version 1.2.5, an uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unauthenticated attacker can send a rapid succession of WebSocket messages, forcing the server to spawn an unbounded number of operating system threads. This leads to thread exhaustion and Out of Memory (OOM) errors, causing a complete Denial of Service (DoS) for any application built on the framework. This issue has been patched in version 1.2.5.","Type":"Description","Title":"Mesop: Unbounded Thread Creation in WebSocket Handler Leads to D"}]}}}