The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-8295

CVE-2026-8295: simdjson Information Disclosure Vulnerability

CVE-2026-8295 is an integer overflow flaw in simdjson that causes buffer miscalculations on 32-bit platforms, potentially exposing sensitive data. This article covers technical details, affected versions, and mitigation.

Published: May 14, 2026

CVE-2026-8295 Overview

CVE-2026-8295 is an integer overflow vulnerability in the simdjson document-builder API. The flaw resides in the string_builder::escape_and_append() function, which performs incorrect buffer size calculations when processing very large input strings. The issue affects platforms with limited size_t width, such as 32-bit builds. The overflow leads to insufficient buffer allocation, which in turn triggers out-of-bounds memory reads in SIMD routines. Consequences include information disclosure, memory corruption, or malformed JSON output. The vulnerability has been fixed in the simdjson 4.6.4 release. It is tracked under CWE-190: Integer Overflow or Wraparound.

Critical Impact

A remote attacker supplying a sufficiently large JSON string to a 32-bit application using simdjson can trigger out-of-bounds reads, potentially disclosing memory contents or corrupting application state.

Affected Products

  • simdjson library versions prior to 4.6.4
  • Applications built against simdjson on 32-bit platforms with narrow size_t width
  • JSON parsing pipelines invoking the document-builder API and string_builder::escape_and_append()

Discovery Timeline

  • 2026-05-14 - CVE-2026-8295 published to NVD
  • 2026-05-14 - Last updated in NVD database
  • simdjson 4.6.4 - Upstream fix released by the simdjson maintainers

Technical Details for CVE-2026-8295

Vulnerability Analysis

The vulnerability stems from an arithmetic miscalculation inside string_builder::escape_and_append(). The function computes the required buffer size for an escaped JSON string by multiplying or adding values derived from the input length. On 32-bit builds, size_t is 32 bits wide, so these calculations can wrap around when the input string is large enough.

The wrap produces a smaller-than-required allocation. Subsequent SIMD-accelerated copy or escape routines write and read past the end of the undersized buffer. The out-of-bounds reads can leak adjacent heap memory back into the produced JSON, while writes can corrupt allocator metadata or neighboring objects.

Because simdjson is widely embedded in web servers, data pipelines, and message brokers, any 32-bit deployment that ingests attacker-controlled JSON is exposed. 64-bit builds are not directly affected because the size_t arithmetic does not overflow in practice for realistic inputs.

Root Cause

The root cause is unchecked integer arithmetic on length values used to size a destination buffer. The code did not validate that the computed size fit within size_t before invoking the allocator. This is a textbook CWE-190 defect amplified by SIMD routines that assume the allocation is correctly sized.

Attack Vector

An attacker delivers a crafted JSON payload containing a very large string to an application using simdjson on a 32-bit build. Parsing through the document-builder API invokes escape_and_append(), which under-allocates and then reads out of bounds during SIMD escaping. The attack vector is network-reachable wherever the parser consumes untrusted input.

No verified public exploit code is available. Refer to the CERT Poland CVE Analysis and the GitHub Release Notes v4.6.4 for technical specifics.

Detection Methods for CVE-2026-8295

Indicators of Compromise

  • Application crashes or segmentation faults in processes that parse JSON using simdjson on 32-bit hosts
  • Malformed JSON responses emitted by services that previously produced well-formed output
  • Unexplained fragments of heap memory appearing within JSON fields returned to clients
  • Inbound HTTP or API requests containing JSON strings several hundred megabytes or larger

Detection Strategies

  • Inventory all binaries linked against simdjson and identify those compiled for 32-bit architectures
  • Inspect dependency manifests for simdjson versions earlier than 4.6.4
  • Deploy runtime memory-safety tooling such as AddressSanitizer in test environments to surface out-of-bounds reads in escape_and_append()
  • Add web application firewall rules that flag JSON payloads exceeding a defined string-length threshold

Monitoring Recommendations

  • Alert on abnormal process termination signals (SIGSEGV, SIGABRT) on services handling external JSON
  • Log and review HTTP request body sizes for endpoints that accept JSON
  • Correlate parser error rates with input size distributions to detect probing attempts

How to Mitigate CVE-2026-8295

Immediate Actions Required

  • Upgrade simdjson to version 4.6.4 or later across all build pipelines and dependent applications
  • Rebuild and redeploy all binaries that statically link simdjson after upgrading
  • Audit 32-bit deployments and prioritize them for patching or migration to 64-bit builds
  • Restrict the maximum accepted JSON payload size at the application or proxy layer

Patch Information

The simdjson maintainers fixed the integer overflow in the 4.6.4 release. The corrected code validates length calculations before allocation in string_builder::escape_and_append(). Patch details and release artifacts are available at the GitHub Release Notes v4.6.4. Additional analysis is published in the CERT Poland CVE Analysis.

Workarounds

  • Reject JSON inputs above a conservative size limit (for example, 16 MB) at the network edge
  • Rebuild affected services as 64-bit binaries where feasible, eliminating the narrow size_t overflow path
  • Route untrusted JSON through a hardened pre-parser that enforces string-length bounds before invoking simdjson
bash
# Configuration example: enforce JSON body size limit in nginx
http {
    client_max_body_size 16m;

    server {
        location /api/ {
            client_body_buffer_size 16m;
            proxy_pass http://backend;
        }
    }
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechSimdjson

  • SeverityMEDIUM

  • CVSS Score6.9

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-190
  • Technical References
  • CERT Poland CVE Analysis

  • GitHub Release Notes v4.6.4
  • Latest CVEs
  • CVE-2026-8468: Elixir Plug Library DoS Vulnerability

  • CVE-2025-68421: Comarch ERP Optima Auth Bypass Vulnerability

  • CVE-2025-68420: Comarch ERP Optima Privilege Escalation

  • CVE-2026-2347: E-Commerce Website Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English