{"id":"CVE-2024-5594","details":"OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.","modified":"2026-04-16T04:38:58.599458325Z","published":"2025-01-06T14:15:08.807Z","related":["SUSE-SU-2025:0278-1","SUSE-SU-2025:1053-1","SUSE-SU-2025:1053-2","SUSE-SU-2025:1131-1","openSUSE-SU-2025:14707-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00005.html"},{"type":"ADVISORY","url":"https://community.openvpn.net/openvpn/wiki/CVE-2024-5594"},{"type":"ADVISORY","url":"https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openvpn/openvpn","events":[{"introduced":"b999466418dddb89721be5455f03bacd9b221b1d"},{"fixed":"ddf6bf6d2a13583535c417532e96e8a8af77f977"}],"database_specific":{"versions":[{"introduced":"2.6.0"},{"fixed":"2.6.11"}]}}],"versions":["v2.6.0","v2.6.1","v2.6.10","v2.6.2","v2.6.3","v2.6.4","v2.6.5","v2.6.6","v2.6.7","v2.6.8","v2.6.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-5594.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}