Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-c5sc-7qnn-mkb9
Vulnerability ID VCID-c5sc-7qnn-mkb9
Aliases CVE-2025-61771
GHSA-w9pc-fmgc-vxvw
Summary Rack: Multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion) `Rack::Multipart::Parser` stores non-file form fields (parts without a `filename`) entirely in memory as Ruby `String` objects. A single large text field in a multipart/form-data request (hundreds of megabytes or more) can consume equivalent process memory, potentially leading to out-of-memory (OOM) conditions and denial of service (DoS).
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61771.json
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2025-61771
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2025-61771
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2025-61771
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2025-61771
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2025-61771
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2025-61771
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2025-61771
epss 0.00098 https://api.first.org/data/v1/epss?cve=CVE-2025-61771
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-w9pc-fmgc-vxvw
cvssv3.1 7.5 https://github.com/rack/rack
generic_textual HIGH https://github.com/rack/rack
cvssv3.1 7.5 https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
generic_textual HIGH https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
ssvc Track https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
cvssv3.1 7.5 https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
generic_textual HIGH https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
ssvc Track https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
cvssv3.1 7.5 https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
generic_textual HIGH https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
ssvc Track https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
cvssv3 7.5 https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw
cvssv3.1 7.5 https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw
cvssv3.1_qr HIGH https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw
generic_textual HIGH https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw
ssvc Track https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw
cvssv3.1 7.5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61771.yml
generic_textual HIGH https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61771.yml
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2025-61771
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2025-61771
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61771.json
https://api.first.org/data/v1/epss?cve=CVE-2025-61771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61771
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/rack/rack
https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
1117628 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117628
2402175 https://bugzilla.redhat.com/show_bug.cgi?id=2402175
CVE-2025-61771 https://nvd.nist.gov/vuln/detail/CVE-2025-61771
CVE-2025-61771.YML https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61771.yml
GHSA-w9pc-fmgc-vxvw https://github.com/advisories/GHSA-w9pc-fmgc-vxvw
GHSA-w9pc-fmgc-vxvw https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw
RHSA-2025:19512 https://access.redhat.com/errata/RHSA-2025:19512
RHSA-2025:19513 https://access.redhat.com/errata/RHSA-2025:19513
RHSA-2025:19647 https://access.redhat.com/errata/RHSA-2025:19647
RHSA-2025:19719 https://access.redhat.com/errata/RHSA-2025:19719
RHSA-2025:19734 https://access.redhat.com/errata/RHSA-2025:19734
RHSA-2025:19800 https://access.redhat.com/errata/RHSA-2025:19800
RHSA-2025:19948 https://access.redhat.com/errata/RHSA-2025:19948
RHSA-2025:20962 https://access.redhat.com/errata/RHSA-2025:20962
RHSA-2025:21036 https://access.redhat.com/errata/RHSA-2025:21036
RHSA-2025:21696 https://access.redhat.com/errata/RHSA-2025:21696
USN-7960-1 https://usn.ubuntu.com/7960-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61771.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rack/rack
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:58Z/ Found at https://github.com/rack/rack/commit/589127f4ac8b5cf11cf88fb0cd116ffed4d2181e
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:58Z/ Found at https://github.com/rack/rack/commit/d869fed663b113b95a74ad53e1b5cae6ab31f29e
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:58Z/ Found at https://github.com/rack/rack/commit/e08f78c656c9394d6737c022bde087e0f33336fd
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-07T17:51:58Z/ Found at https://github.com/rack/rack/security/advisories/GHSA-w9pc-fmgc-vxvw
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2025-61771.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2025-61771
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.27146
EPSS Score 0.00098
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:52:57.840999+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rack/CVE-2025-61771.yml 38.0.0