PatchSiren cyber security CVE debrief
CVE-2026-8741 Unknown Vendor CVE debrief
CVE-2026-8741 describes a race condition in EMQX up to 6.2.0 affecting the QoS 2 PUBLISH packet handler in persistent sessions. The issue is remotely reachable, but the recorded attack complexity is high and the CVSS score is low (1.3). The vulnerability was publicly disclosed, and the vendor was contacted early according to the source record.
- Vendor
- Unknown Vendor
- Product
- Unknown
- CVSS
- LOW 1.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-17
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-05-17
- Advisory updated
- 2026-05-18
Who should care
Administrators and operators running EMQX deployments that use MQTT QoS 2 and persistent sessions should review their exposure. Security teams should also care if EMQX is internet-facing or if reliability of message delivery is operationally important.
Technical summary
The NVD record, sourced from VulDB CNA metadata, describes a race condition in apps/emqx/src/emqx_persistent_session_ds.erl within the QoS 2 PUBLISH packet handler. The attack is remote, requires high complexity, and is noted as difficult to exploit. The record maps the weakness to CWE-362 and lists the vulnerability status as received. No exploit code or reproduction details are included here.
Defensive priority
Low-to-moderate operational priority. The CVSS score is low, but the affected path is part of MQTT QoS 2 persistent-session handling, so environments relying on message integrity or high availability should still validate exposure and apply vendor guidance promptly.
Recommended defensive actions
- Inventory EMQX instances and confirm whether versions up to 6.2.0 are in use.
- Check whether QoS 2 and persistent sessions are enabled or relied on in production workflows.
- Review vendor and project guidance linked from the public report before making changes.
- Patch or upgrade to a fixed version once available from the vendor/project.
- If immediate patching is not possible, reduce exposure by limiting network access to EMQX and monitoring for abnormal session or message-duplication behavior.
- Track the issue in change management because the vulnerability was publicly disclosed.
Evidence notes
Source data ties CVE-2026-8741 to EMQX up to 6.2.0, a race condition in the QoS 2 PUBLISH Packet Handler, with remote attackability, high complexity, and public disclosure. The CVE record was published on 2026-05-17T09:16:35.013Z. The NVD metadata also lists CWE-362 and references a GitHub research report plus VulDB pages.
Official resources
Publicly disclosed; the source record states the exploit has been disclosed to the public and may be used, and that the vendor was contacted early about the disclosure.