← Zuruck zu CVEs
CVE-2025-62727
HIGH7.5
Beschreibung
Starlette is a lightweight ASGI framework/toolkit. Starting in version 0.39.0 and prior to version 0.49.1 , an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing in Starlette's FileResponse Range parsing/merging logic. This enables CPU exhaustion per request, causing denial‑of‑service for endpoints serving files (e.g., StaticFiles or any use of FileResponse). This vulnerability is fixed in 0.49.1.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/28/2025
Zuletzt geandert11/4/2025
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-407
Referenzen
https://github.com/Kludex/starlette/commit/4ea6e22b489ec388d6004cfbca52dd5b147127c5(security-advisories@github.com)
https://github.com/Kludex/starlette/commit/69ed26a85956ef4bd0161807eb27abf49be7cd3c(security-advisories@github.com)
https://github.com/Kludex/starlette/releases/tag/0.49.1(security-advisories@github.com)
https://github.com/Kludex/starlette/security/advisories/GHSA-7f5h-v6xp-fcq8(security-advisories@github.com)
https://github.com/Kludex/starlette/security/advisories/GHSA-7f5h-v6xp-fcq8(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.