Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-azu5-jcmd-3ufx
Vulnerability ID VCID-azu5-jcmd-3ufx
Aliases CVE-2025-61772
GHSA-wpv5-97wm-hp9c
Summary Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion) `Rack::Multipart::Parser` can accumulate unbounded data when a multipart part’s header block never terminates with the required blank line (`CRLFCRLF`). The parser keeps appending incoming bytes to memory without a size cap, allowing a remote attacker to exhaust memory and cause a denial of service (DoS).
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61772.json
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2025-61772
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2025-61772
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2025-61772
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2025-61772
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2025-61772
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2025-61772
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2025-61772
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2025-61772
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2025-61772
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-wpv5-97wm-hp9c
cvssv3.1 7.5 https://github.com/rack/rack
generic_textual HIGH https://github.com/rack/rack
cvssv3.1 7.5 https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
generic_textual HIGH https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
ssvc Track https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
cvssv3.1 7.5 https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
generic_textual HIGH https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
ssvc Track https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
cvssv3.1 7.5 https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
generic_textual HIGH https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
ssvc Track https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
cvssv3 7.5 https://github.com/rack/rack/security/advisories/GHSA-wpv5-97wm-hp9c
cvssv3.1 7.5 https://github.com/rack/rack/security/advisories/GHSA-wpv5-97wm-hp9c
cvssv3.1_qr HIGH https://github.com/rack/rack/security/advisories/GHSA-wpv5-97wm-hp9c
generic_textual HIGH https://github.com/rack/rack/security/advisories/GHSA-wpv5-97wm-hp9c
ssvc Track https://github.com/rack/rack/security/advisories/GHSA-wpv5-97wm-hp9c
cvssv3.1 7.5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61772.yml
generic_textual HIGH https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61772.yml
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2025-61772
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2025-61772
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61772.json
https://api.first.org/data/v1/epss?cve=CVE-2025-61772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61772
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/rack/rack
https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
1117627 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117627
2402200 https://bugzilla.redhat.com/show_bug.cgi?id=2402200
CVE-2025-61772 https://nvd.nist.gov/vuln/detail/CVE-2025-61772
CVE-2025-61772.YML https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61772.yml
GHSA-wpv5-97wm-hp9c https://github.com/advisories/GHSA-wpv5-97wm-hp9c
GHSA-wpv5-97wm-hp9c https://github.com/rack/rack/security/advisories/GHSA-wpv5-97wm-hp9c
RHSA-2025:19512 https://access.redhat.com/errata/RHSA-2025:19512
RHSA-2025:19513 https://access.redhat.com/errata/RHSA-2025:19513
RHSA-2025:19647 https://access.redhat.com/errata/RHSA-2025:19647
RHSA-2025:19719 https://access.redhat.com/errata/RHSA-2025:19719
RHSA-2025:19733 https://access.redhat.com/errata/RHSA-2025:19733
RHSA-2025:19734 https://access.redhat.com/errata/RHSA-2025:19734
RHSA-2025:19736 https://access.redhat.com/errata/RHSA-2025:19736
RHSA-2025:19800 https://access.redhat.com/errata/RHSA-2025:19800
RHSA-2025:19948 https://access.redhat.com/errata/RHSA-2025:19948
RHSA-2025:20962 https://access.redhat.com/errata/RHSA-2025:20962
RHSA-2025:21036 https://access.redhat.com/errata/RHSA-2025:21036
USN-7960-1 https://usn.ubuntu.com/7960-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61772.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rack/rack
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:19Z/ Found at https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:19Z/ Found at https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:19Z/ Found at https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rack/rack/security/advisories/GHSA-wpv5-97wm-hp9c
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:19Z/ Found at https://github.com/rack/rack/security/advisories/GHSA-wpv5-97wm-hp9c
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61772.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2025-61772
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.41249
EPSS Score 0.00193
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:52:58.110093+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rack/CVE-2025-61772.yml 38.0.0