Prosody Memory Exhaustion Vulnerability (CVE-2026-43506)
Prosody versions before 0.12.6, versions 1.0.0 through 13.0.0, and before version 13.0.5 are vulnerable to a denial of service due to memory leaks from unauthenticated connections, leading to memory exhaustion.
A denial of service vulnerability, identified as CVE-2026-43506, affects Prosody, a popular XMPP server. The vulnerability exists in versions prior to 0.12.6, versions 1.0.0 through 13.0.0, and before version 13.0.5. Successful exploitation of this vulnerability results in a denial-of-service condition due to memory exhaustion. The root cause is memory leaks triggered by unauthenticated connections, which gradually consume server resources until the system becomes unresponsive. This vulnerability was publicly disclosed on May 1, 2026, and poses a risk to organizations using affected versions of Prosody, as it can disrupt communication services and impact overall system availability.
Attack Chain
- An attacker establishes an unauthenticated connection to the Prosody server.
- The connection triggers a memory leak within the Prosody server software.
- The memory leak consumes a small amount of system memory.
- The attacker repeatedly establishes new unauthenticated connections.
- Each connection triggers further memory leaks, compounding the memory consumption.
- The server’s available memory is gradually exhausted due to the accumulated leaks.
- As memory resources diminish, the Prosody server’s performance degrades.
- Eventually, the Prosody server becomes unresponsive, resulting in a denial-of-service condition.
Impact
The successful exploitation of CVE-2026-43506 can lead to a denial-of-service condition, rendering the Prosody XMPP server unavailable. This can disrupt communication services for organizations relying on the affected Prosody versions. The impact can range from temporary service interruptions to prolonged outages, depending on the severity of the memory exhaustion and the organization’s recovery capabilities. There is no specific information available on the number of victims or specific sectors targeted.
Recommendation
- Upgrade Prosody servers to version 0.12.6 or 13.0.5 or later to remediate CVE-2026-43506.
- Monitor Prosody server resource utilization, specifically memory consumption, for unusual increases that could indicate exploitation attempts.
- Deploy the Sigma rules provided in this brief to detect potential denial-of-service attacks exploiting CVE-2026-43506 by monitoring connection patterns.
Detection coverage 2
Detect High Number of Unauthenticated Connections to Prosody
mediumThis rule detects a high number of unauthenticated connections to a Prosody server, which could indicate a denial-of-service attack exploiting CVE-2026-43506.
Prosody Server Memory Usage Spike
mediumDetects a significant increase in memory usage by the Prosody process, which could indicate a memory leak vulnerability being exploited.
Detection queries are kept inside the platform. Get full rules →