CVE-2025-59830
BaseFortify
Publication date: 2025-09-25
Last updated on: 2025-10-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rack | rack | to 2.2.18 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Rack Ruby web server interface before version 2.2.18. The Rack::QueryParser enforces a limit on the number of parameters only for those separated by '&', but it splits parameters on both '&' and ';'. Attackers can exploit this by using ';' as a separator to bypass the parameter count limit, allowing them to submit more parameters than intended. This can lead to increased CPU and memory usage.
How can this vulnerability impact me? :
If your application or middleware uses Rack::QueryParser with its default configuration, this vulnerability can be exploited to cause increased CPU and memory consumption, potentially leading to a limited denial-of-service (DoS) attack.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Rack to version 2.2.18 or later, where the issue has been patched to properly enforce the params_limit and prevent bypass via ';' separators.