CVE-2025-6176
BaseFortify
Publication date: 2025-10-31
Last updated on: 2025-11-04
Assigner: huntr.dev
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| scrapy | scrapy | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Scrapy versions up to 2.13.2 and is due to a flaw in the brotli decompression implementation. The protection mechanism against decompression bombs does not work properly for brotli compressed data, allowing remote servers to send specially crafted compressed data that causes excessive memory consumption during decompression. This can lead to a denial of service (DoS) by crashing clients with less than 80GB of available memory.
How can this vulnerability impact me? :
The vulnerability can cause a denial of service (DoS) on clients using vulnerable Scrapy versions by crashing them due to excessive memory consumption during brotli decompression. This can disrupt services or applications relying on Scrapy for web scraping or data extraction, leading to downtime or loss of availability.