News KrakenD CE 2.13.5 and EE 2.13.3 update released

Product UpdatesSecurity

2 min read

KrakenD CE 2.13.5 and EE 2.13.3 update released

by Jorge Tarrero

This patch release of KrakenD Community Edition and Enterprise Edition upgrades the Golang version to 1.25.10 to address several disclosed CVEs. It also addresses a set of vulnerabilities in both OTPL exporters and Prometheus-dependendant components.

Additionally, we’ve introduced an important bump to the auth/ntlm component (Enterprise-only) addressing addressing CVE-2026-32952 and many other improvements.

🚀 Summary of changes for EEv2.13.3 (patch)

Recommended security upgrade addressing several vulnerabilities

  • Upgraded auth/ntlm component addressing CVE-2026-32952.
  • Upgraded OTLP HTTP exporters addressing CVE-2026-39882.
  • Upgraded Prometheus dependency addressing CVE-2026-42154, CVE-2026-42151 and CVE-2026-40179.
  • Upgraded Go to 1.25.10, addressing several CVEs with disclosed descriptions:
    • CVE-2026-42501 cmd/go: malicious module proxy can bypass checksum database (false positive)
    • CVE-2026-39819 cmd/go: “go bug” follows symlinks in predictable temporary filenames (false positive)
    • CVE-2026-39817 cmd/go: “go tool pack” does not sanitize output paths (false positive)
    • CVE-2026-39825 net/http/httputil: ReverseProxy forwards queries with more than urlmaxqueryparams parameters
    • CVE-2026-39836 net: panic in Dial and LookupPort when handling NUL byte on Windows (false positive)
    • CVE-2026-33811 net: crash when handling long CNAME response
    • CVE-2026-42499 net/mail: quadratic string concatenation in consumePhrase (false positive)
    • CVE-2026-39820 net/mail: quadratic string concatentation in consumeComment (false positive)
    • CVE-2026-33814 net/http: infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE
    • CVE-2026-39826 html/template: escaper bypass leads to XSS (false positive)
    • CVE-2026-39823 html/template: bypass of meta content URL escaping causes XSS (false positive)

Upgrading to the latest version is always advised.

🚀 Summary of changes for CEv2.13.5 (patch)

Recommended security upgrade addressing several vulnerabilities

  • Upgraded OTLP HTTP exporters addressing CVE-2026-39882.
  • Upgraded Prometheus dependency addressing CVE-2026-42154, CVE-2026-42151 and CVE-2026-40179.
  • Upgraded Go to 1.25.10, addressing several CVEs with disclosed descriptions:
    • CVE-2026-42501 cmd/go: malicious module proxy can bypass checksum database (false positive)
    • CVE-2026-39819 cmd/go: “go bug” follows symlinks in predictable temporary filenames (false positive)
    • CVE-2026-39817 cmd/go: “go tool pack” does not sanitize output paths (false positive)
    • CVE-2026-39825 net/http/httputil: ReverseProxy forwards queries with more than urlmaxqueryparams parameters
    • CVE-2026-39836 net: panic in Dial and LookupPort when handling NUL byte on Windows (false positive)
    • CVE-2026-33811 net: crash when handling long CNAME response
    • CVE-2026-42499 net/mail: quadratic string concatenation in consumePhrase (false positive)
    • CVE-2026-39820 net/mail: quadratic string concatentation in consumeComment (false positive)
    • CVE-2026-33814 net/http: infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE
    • CVE-2026-39826 html/template: escaper bypass leads to XSS (false positive)
    • CVE-2026-39823 html/template: bypass of meta content URL escaping causes XSS (false positive)

Upgrading to the latest version is always advised.

Stay up to date with KrakenD releases and important updates