CVE-2025-6140
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-16

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability, which was classified as problematic, was found in spdlog up to 1.15.1. This affects the function scoped_padder in the library include/spdlog/pattern_formatter-inl.h. The manipulation leads to resource consumption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.15.2 is able to address this issue. The identifier of the patch is 10320184df1eb4638e253a34b1eb44ce78954094. It is recommended to upgrade the affected component.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-16
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-06-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gabime spdlog to 1.15.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-404 The product does not release or incorrectly releases a resource before it is made available for re-use.
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the spdlog library up to version 1.15.1, specifically in the function scoped_padder within the pattern_formatter-inl.h file. It allows an attacker with local access to cause resource consumption, which can lead to performance degradation or denial of service. The issue has been publicly disclosed and can be exploited locally. Upgrading to version 1.15.2 fixes this vulnerability.


How can this vulnerability impact me? :

The vulnerability can lead to increased resource consumption on the affected system when exploited locally. This may cause performance issues or denial of service conditions, potentially disrupting normal operations of applications using the vulnerable spdlog library.


What immediate steps should I take to mitigate this vulnerability?

The recommended immediate step to mitigate this vulnerability is to upgrade the spdlog library to version 1.15.2 or later, as this version contains the patch that addresses the issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart