CVE-2025-5115
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-11-04
Assigner: Eclipse Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eclipse | jetty | 11.0.26 |
| eclipse | jetty | 10.0.25 |
| eclipse | jetty | 12.1.0.alpha2 |
| eclipse | jetty | 12.0.21 |
| eclipse | jetty | 9.4.57 |
| eclipse | jetty | 9.4.58 |
| eclipse | jetty | 11.0.25 |
| eclipse | jetty | 10.0.26 |
| eclipse | jetty | 12.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Eclipse Jetty (versions <=9.4.57, <=10.0.25, <=11.0.25, <=12.0.21, <=12.1.0.alpha2) allows an HTTP/2 client to cause the server to send RST_STREAM frames by sending malformed frames or frames that are not allowed in a particular stream state. For example, a client can send WINDOW_UPDATE frames with a window size increment of 0, which is illegal and causes the server to respond with RST_STREAM frames. By repeatedly opening streams and sending such bad frames, the client can force the server to consume excessive CPU and memory resources, potentially leading to resource exhaustion.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to cause a denial of service on the server running Eclipse Jetty. By sending malformed HTTP/2 frames repeatedly, the attacker can force the server to consume excessive CPU and memory resources, potentially degrading performance or causing the server to become unresponsive.