Description

Mercure is a protocol for pushing data updates to web browsers and other HTTP clients in a battery-efficient way. Prior to 0.22.0, a cache key collision vulnerability in TopicSelectorStore allows an attacker to poison the match result cache, potentially causing private updates to be delivered to unauthorized subscribers or blocking delivery to authorized ones. The cache key was constructed by concatenating the topic selector and topic with an underscore separator. Because both topic selectors and topics can contain underscores, two distinct pairs can produce the same key. An attacker who can subscribe to the hub or publish updates with crafted topic names can exploit this to bypass authorization checks on private updates. This vulnerability is fixed in 0.22.0.

INFO

Published Date :

2026-04-09T16:42:22.903Z

Last Modified :

2026-04-09T18:59:49.306Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-39972 vulnerability.

Vendors Products
Dunglas
  • Mercure
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-39972.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability