CVE-2026-22819

5.9 MEDIUM

📋 TL;DR

Outray versions before 0.1.5 contain a race condition vulnerability where free plan users can bypass subdomain limits due to missing database transaction locks. This allows unauthorized acquisition of additional subdomains beyond their allocated quota. Only Outray instances with free plan users are affected.

💻 Affected Systems

Products:
  • Outray
Versions: All versions before 0.1.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances with free tier users enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Free users could exhaust all available subdomains, causing denial of service for legitimate users and potentially enabling phishing attacks through unauthorized subdomain acquisition.

🟠

Likely Case

Free users gradually acquire more subdomains than allowed, leading to resource exhaustion and service degradation over time.

🟢

If Mitigated

With proper rate limiting and monitoring, impact is limited to minor resource consumption anomalies.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated free user account. Simple race condition exploitation via concurrent requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.1.5

Vendor Advisory: https://github.com/outray-tunnel/outray/security/advisories/GHSA-45hj-9x76-wp9g

Restart Required: Yes

Instructions:

1. Update Outray to version 0.1.5 or later. 2. Restart the Outray service. 3. Verify the fix by checking the version.

🔧 Temporary Workarounds

Disable free tier

all

Temporarily disable free user registrations to prevent exploitation

Modify configuration to disable free tier signups

Rate limiting

all

Implement strict rate limiting on subdomain creation endpoints

Configure rate limiting middleware for /api/*/subdomains endpoints

🧯 If You Can't Patch

  • Implement application-level locking mechanisms for subdomain creation
  • Monitor subdomain creation logs for suspicious patterns and alert on anomalies

🔍 How to Verify

Check if Vulnerable:

Check if Outray version is below 0.1.5 and free tier is enabled

Check Version:

outray --version or check package.json version

Verify Fix Applied:

Confirm version is 0.1.5 or higher and test subdomain creation limits

📡 Detection & Monitoring

Log Indicators:

  • Multiple subdomain creation requests from same free user in short timeframe
  • Subdomain count exceeding free tier limits

Network Indicators:

  • Bursts of POST requests to /api/*/subdomains endpoints

SIEM Query:

source="outray" AND (path="/api/*/subdomains" AND method="POST") | stats count by user_id | where count > threshold

🔗 References

📤 Share & Export