CVE-2025-53864
BaseFortify
Publication date: 2025-07-11
Last updated on: 2025-09-23
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gson | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-674 | The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Connect2id Nimbus JOSE + JWT versions before 10.0.2 allows a remote attacker to cause a denial of service by supplying a deeply nested JSON object within a JWT claim set. The issue arises due to uncontrolled recursion when processing the nested JSON, which can exhaust system resources and cause the application to crash or become unresponsive.
How can this vulnerability impact me? :
The impact of this vulnerability is a denial of service (DoS), meaning an attacker can cause the affected application to crash or become unavailable by sending a specially crafted JWT with deeply nested JSON. This can disrupt service availability and affect users relying on the application.