Generated remediation guidance and an executive summary. No account required.
zrok is software for sharing web services, files, and network resources. Prior to version 2.0.1, endpoints.GetSessionCookie parses an attacker-supplied cookie chunk count and calls make([]string, count) with no upper bound before any token validation occurs. The function is reached on every request to an OAuth-protected proxy share, allowing an unauthenticated remote attacker to trigger gigabyte-scale heap allocations per request, leading to process-level OOM termination or repeated goroutine panics. Both publicProxy and dynamicProxy are affected. Version 2.0.1 patches the issue.
Use CWE-400, Netfoundry vendor hub and Zrok product page to widen CVE-2026-40303 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-40302 and CVE-2026-40304 for nearby disclosures in the same product family.