{"api_version":"1","generated_at":"2026-04-23T23:45:23+00:00","cve":"CVE-2026-40894","urls":{"html":"https://cve.report/CVE-2026-40894","api":"https://cve.report/api/cve/CVE-2026-40894.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-40894","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-40894"},"summary":{"title":"OpenTelemetry dotnet: Excessive memory allocation when parsing OpenTelemetry propagation headers","description":"OpenTelemetry dotnet is a dotnet telemetry framework. In OpenTelemetry.Api 0.5.0-beta.2 to 1.15.2 and OpenTelemetry.Extensions.Propagators 1.3.1 to 1.15.2, The implementation details of the baggage, B3 and Jaeger processing code in the OpenTelemetry.Api and OpenTelemetry.Extensions.Propagators NuGet packages can allocate excessive memory when parsing which could create a potential denial of service (DoS) in the consuming application. This vulnerability is fixed in 1.15.3.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-23 19:17:28","updated_at":"2026-04-23 19:17:28"},"problem_types":["CWE-789","CWE-789 CWE-789: Memory Allocation with Excessive Size Value"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"}}],"references":[{"url":"https://github.com/open-telemetry/opentelemetry-dotnet/security/advisories/GHSA-g94r-2vxg-569j","name":"https://github.com/open-telemetry/opentelemetry-dotnet/security/advisories/GHSA-g94r-2vxg-569j","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/533","name":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/533","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/3309","name":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/3309","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/1048","name":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/1048","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/7061","name":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/7061","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/3244","name":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/3244","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-40894","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40894","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"open-telemetry","product":"opentelemetry-dotnet","version":"affected >= 0.5.0-beta.2, < 1.15.3","platforms":[]},{"source":"CNA","vendor":"open-telemetry","product":"OpenTelemetry.Api","version":"affected >= 0.5.0-beta.2, < 1.15.3","platforms":[]},{"source":"CNA","vendor":"open-telemetry","product":"OpenTelemetry.Extensions.Propagators","version":"affected >= 1.3.1, < 1.15.3","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"opentelemetry-dotnet","vendor":"open-telemetry","versions":[{"status":"affected","version":">= 0.5.0-beta.2, < 1.15.3"}]},{"product":"OpenTelemetry.Api","vendor":"open-telemetry","versions":[{"status":"affected","version":">= 0.5.0-beta.2, < 1.15.3"}]},{"product":"OpenTelemetry.Extensions.Propagators","vendor":"open-telemetry","versions":[{"status":"affected","version":">= 1.3.1, < 1.15.3"}]}],"descriptions":[{"lang":"en","value":"OpenTelemetry dotnet is a dotnet telemetry framework. In OpenTelemetry.Api 0.5.0-beta.2 to 1.15.2 and OpenTelemetry.Extensions.Propagators 1.3.1 to 1.15.2, The implementation details of the baggage, B3 and Jaeger processing code in the OpenTelemetry.Api and OpenTelemetry.Extensions.Propagators NuGet packages can allocate excessive memory when parsing which could create a potential denial of service (DoS) in the consuming application. This vulnerability is fixed in 1.15.3."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-789","description":"CWE-789: Memory Allocation with Excessive Size Value","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-23T18:03:28.211Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/open-telemetry/opentelemetry-dotnet/security/advisories/GHSA-g94r-2vxg-569j","tags":["x_refsource_CONFIRM"],"url":"https://github.com/open-telemetry/opentelemetry-dotnet/security/advisories/GHSA-g94r-2vxg-569j"},{"name":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/1048","tags":["x_refsource_MISC"],"url":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/1048"},{"name":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/3244","tags":["x_refsource_MISC"],"url":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/3244"},{"name":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/3309","tags":["x_refsource_MISC"],"url":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/3309"},{"name":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/533","tags":["x_refsource_MISC"],"url":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/533"},{"name":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/7061","tags":["x_refsource_MISC"],"url":"https://github.com/open-telemetry/opentelemetry-dotnet/pull/7061"}],"source":{"advisory":"GHSA-g94r-2vxg-569j","discovery":"UNKNOWN"},"title":"OpenTelemetry dotnet: Excessive memory allocation when parsing OpenTelemetry propagation headers"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-40894","datePublished":"2026-04-23T18:03:28.211Z","dateReserved":"2026-04-15T16:37:22.766Z","dateUpdated":"2026-04-23T18:03:28.211Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-23 19:17:28","lastModifiedDate":"2026-04-23 19:17:28","problem_types":["CWE-789","CWE-789 CWE-789: Memory Allocation with Excessive Size Value"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"40894","Ordinal":"1","Title":"OpenTelemetry dotnet: Excessive memory allocation when parsing O","CVE":"CVE-2026-40894","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"40894","Ordinal":"1","NoteData":"OpenTelemetry dotnet is a dotnet telemetry framework. In OpenTelemetry.Api 0.5.0-beta.2 to 1.15.2 and OpenTelemetry.Extensions.Propagators 1.3.1 to 1.15.2, The implementation details of the baggage, B3 and Jaeger processing code in the OpenTelemetry.Api and OpenTelemetry.Extensions.Propagators NuGet packages can allocate excessive memory when parsing which could create a potential denial of service (DoS) in the consuming application. This vulnerability is fixed in 1.15.3.","Type":"Description","Title":"OpenTelemetry dotnet: Excessive memory allocation when parsing O"}]}}}