Allocation of Resources Without Limits or Throttling Affecting github.com/swift-otel/swift-w3c-trace-context package, versions <1.0.0-beta.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.15% (36th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-SWIFT-SWIFTOTELSWIFTW3CTRACECONTEXT-15046286
  • published21 Jan 2026
  • disclosed21 Jan 2026
  • creditHonza Dvorsky

Introduced: 21 Jan 2026

CVE-2026-23886  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade swift-otel/swift-w3c-trace-context to version 1.0.0-beta.5 or higher.

Overview

swift-otel/swift-w3c-trace-context is a Micro-library exposing the W3C Trace-Context as a Swift struct

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to improper input validation. An attacker can cause a crash of the service by sending a specially crafted malformed HTTP header from the network.

Workaround

This vulnerability can be mitigated by disabling either Swift OTel or the code that extracts the trace information from an incoming header (such as a TracingMiddleware).

CVSS Base Scores

version 4.0
version 3.1