CVE-2025-49763
BaseFortify
Publication date: 2025-06-19
Last updated on: 2025-07-01
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | traffic_server | From 9.0.0 (inc) to 9.2.11 (exc) |
| apache | traffic_server | From 10.0.0 (inc) to 10.0.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability is in the ESI plugin of Apache Traffic Server, which lacks a limit on the maximum inclusion depth. This allows an attacker to insert malicious instructions that cause excessive memory consumption.
How can this vulnerability impact me? :
This vulnerability can lead to excessive memory consumption on systems running affected versions of Apache Traffic Server, potentially causing performance degradation or denial of service.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade Apache Traffic Server to version 9.2.11 or 10.0.6 or later. Additionally, you can configure the ESI plugin with the new setting --max-inclusion-depth to limit the maximum inclusion depth and prevent excessive memory consumption.