CVE-2026-24874

9.1 CRITICAL

📋 TL;DR

This is a type confusion vulnerability in the xray-monolith software that allows attackers to access memory with incompatible types, potentially leading to arbitrary code execution or system crashes. It affects all users running xray-monolith versions before 2025.12.30. The vulnerability stems from improper type handling in the software's memory management.

💻 Affected Systems

Products:
  • xray-monolith
Versions: All versions before 2025.12.30
Operating Systems: All platforms running xray-monolith
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with system-level privileges, complete system compromise, and potential lateral movement across networks.

🟠

Likely Case

Application crash leading to denial of service, or limited information disclosure through memory leaks.

🟢

If Mitigated

Application instability or crashes without full system compromise if proper isolation and privilege separation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Type confusion vulnerabilities typically require some understanding of the software's internal structures but can be exploited without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.12.30 or later

Vendor Advisory: https://github.com/themrdemonized/xray-monolith/pull/399

Restart Required: Yes

Instructions:

1. Update xray-monolith to version 2025.12.30 or later. 2. Restart the xray-monolith service. 3. Verify the update was successful.

🔧 Temporary Workarounds

Disable vulnerable components

all

If specific vulnerable features can be identified and disabled without breaking core functionality.

Network isolation

all

Restrict network access to xray-monolith instances to only trusted sources.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to xray-monolith instances
  • Deploy additional monitoring and intrusion detection specifically for xray-monolith processes

🔍 How to Verify

Check if Vulnerable:

Check the xray-monolith version. If it's earlier than 2025.12.30, it's vulnerable.

Check Version:

xray-monolith --version or check package manager

Verify Fix Applied:

Verify the version is 2025.12.30 or later and test functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes or segmentation faults in xray-monolith logs
  • Memory access violation errors

Network Indicators:

  • Unusual network connections from xray-monolith processes
  • Traffic patterns indicating exploitation attempts

SIEM Query:

process:xray-monolith AND (event:crash OR event:segfault OR event:memory_violation)

🔗 References

📤 Share & Export