Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-32zq-s261-57fa
Vulnerability ID VCID-32zq-s261-57fa
Aliases CVE-2025-26803
GHSA-2cj2-qqxj-5m3r
Summary Phusion Passenger denial of service The http parser in Phusion Passenger 6.0.21 through 6.0.25 before 6.0.26 allows a denial of service during parsing of a request with an invalid HTTP method.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00195 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00271 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
epss 0.00501 https://api.first.org/data/v1/epss?cve=CVE-2025-26803
cvssv3.1 5.3 https://blog.phusion.nl/2025/02/19/passenger-6-0-26
generic_textual MODERATE https://blog.phusion.nl/2025/02/19/passenger-6-0-26
cvssv3.1 5.3 https://blog.phusion.nl/2025/02/19/passenger-6-0-26/
ssvc Track https://blog.phusion.nl/2025/02/19/passenger-6-0-26/
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 5.3 https://github.com/advisories/GHSA-2cj2-qqxj-5m3r
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-2cj2-qqxj-5m3r
cvssv3.1 5.3 https://github.com/phusion/passenger
generic_textual MODERATE https://github.com/phusion/passenger
cvssv3.1 5.3 https://github.com/phusion/passenger/commit/bb15591646687064ab2d578d5f9660b2a4168017
generic_textual MODERATE https://github.com/phusion/passenger/commit/bb15591646687064ab2d578d5f9660b2a4168017
ssvc Track https://github.com/phusion/passenger/commit/bb15591646687064ab2d578d5f9660b2a4168017
cvssv3.1 5.3 https://github.com/phusion/passenger/compare/release-6.0.25...release-6.0.26
generic_textual MODERATE https://github.com/phusion/passenger/compare/release-6.0.25...release-6.0.26
ssvc Track https://github.com/phusion/passenger/compare/release-6.0.25...release-6.0.26
cvssv3.1 5.3 https://github.com/phusion/passenger/releases/tag/release-6.0.26
generic_textual MODERATE https://github.com/phusion/passenger/releases/tag/release-6.0.26
ssvc Track https://github.com/phusion/passenger/releases/tag/release-6.0.26
cvssv3.1 5.3 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2025-26803.yml
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2025-26803.yml
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2025-26803
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2025-26803
cvssv3.1 5.3 https://www.phusionpassenger.com/support
generic_textual MODERATE https://www.phusionpassenger.com/support
ssvc Track https://www.phusionpassenger.com/support
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://blog.phusion.nl/2025/02/19/passenger-6-0-26
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://blog.phusion.nl/2025/02/19/passenger-6-0-26/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T16:59:12Z/ Found at https://blog.phusion.nl/2025/02/19/passenger-6-0-26/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/phusion/passenger
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/phusion/passenger/commit/bb15591646687064ab2d578d5f9660b2a4168017
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T16:59:12Z/ Found at https://github.com/phusion/passenger/commit/bb15591646687064ab2d578d5f9660b2a4168017
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/phusion/passenger/compare/release-6.0.25...release-6.0.26
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T16:59:12Z/ Found at https://github.com/phusion/passenger/compare/release-6.0.25...release-6.0.26
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/phusion/passenger/releases/tag/release-6.0.26
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T16:59:12Z/ Found at https://github.com/phusion/passenger/releases/tag/release-6.0.26
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2025-26803.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2025-26803
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://www.phusionpassenger.com/support
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T16:59:12Z/ Found at https://www.phusionpassenger.com/support
Exploit Prediction Scoring System (EPSS)
Percentile 0.41496
EPSS Score 0.00195
Published At April 4, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:55:46.338562+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-2cj2-qqxj-5m3r/GHSA-2cj2-qqxj-5m3r.json 38.0.0