CVE-2025-30188
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-31

Last updated on: 2025-11-04

Assigner: Open-Xchange

Description
Malicious or unintentional API requests can be used to add significant amount of data to caches. Caches may evict information that is required to operate the web frontend, which leads to unavailability of the component. Please deploy the provided updates and patch releases. No publicly available exploits are known
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-10-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
open-xchange ox_app_suite_uimiddleware 2.1.7
open-xchange ox_app_suite_uimiddleware 2.1.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-30188 is a vulnerability in the OX App Suite uimiddleware version 2.1.7 where malicious or unintentional API requests can add a large amount of data to caches. This excessive data causes resource exhaustion by evicting critical information needed for the web frontend to operate, leading to denial of service and unavailability of the component. [1]


How can this vulnerability impact me? :

This vulnerability can cause denial of service (DoS) by making the web frontend component unavailable. The cache pollution leads to eviction of essential data, disrupting normal operation and potentially causing downtime or service interruptions. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves malicious or unintentional API requests that add significant data to caches, causing resource exhaustion and denial of service. Detection can involve monitoring for unusually high volumes of API requests or cache usage spikes. Specific commands are not provided in the resources, but general approaches include using network monitoring tools to detect abnormal API traffic patterns and system commands to check cache size and eviction rates. For example, monitoring logs for excessive API calls or using system tools to observe cache memory usage may help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to deploy the provided updates and patch releases. Specifically, upgrade the OX App Suite uimiddleware from version 2.1.7 to version 2.1.8 or later, where the vulnerability is fixed. This will prevent malicious or unintentional API requests from causing cache pollution and denial of service. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart