A vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to trigger a denial of service (DoS) condition. By sending a specially crafted HTTP POST request containing a null byte in the payload, the server enters an infinite loop during form data parsing. Multiple malicious requests will result in complete CPU exhaustion and render the service unresponsive to further requests.
This issue was fixed in commit 782e189. This issue affects only the library, standalone executable pre-built by vendor is not affected.
Metrics
Affected Vendors & Products
References
History
Tue, 30 Sep 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Civetweb Project
Civetweb Project civetweb |
|
Vendors & Products |
Civetweb Project
Civetweb Project civetweb |
Tue, 30 Sep 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 29 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 29 Sep 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to trigger a denial of service (DoS) condition. By sending a specially crafted HTTP POST request containing a null byte in the payload, the server enters an infinite loop during form data parsing. Multiple malicious requests will result in complete CPU exhaustion and render the service unresponsive to further requests. This issue was fixed in commit 782e189. This issue affects only the library, standalone executable pre-built by vendor is not affected. | |
Title | Denial of Service in CivetWeb | |
Weaknesses | CWE-158 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-09-29T11:47:56.141Z
Updated: 2025-09-29T12:53:45.646Z
Reserved: 2025-08-29T06:31:14.132Z
Link: CVE-2025-9648

Updated: 2025-09-29T12:53:38.324Z

Status : Awaiting Analysis
Published: 2025-09-29T12:15:49.440
Modified: 2025-09-29T19:34:10.030
Link: CVE-2025-9648
