CVE-2025-10543
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-02
Assigner: Eclipse Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eclipse | paho_mqtt_golang | 1.5.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-681 | When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur. |
| CWE-197 | Truncation errors occur when a primitive is cast to a primitive of a smaller size and data is lost in the conversion. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Eclipse Paho Go MQTT v3.1 library versions up to 1.5.0. When UTF-8 encoded strings longer than 65535 bytes are passed into the library, their length is incorrectly encoded due to an integer overflow issue. Specifically, the length is converted from a larger integer type (int64/int32) to a smaller int16 without proper overflow checks. This causes the length field to be incorrect, leading to packets that contain unexpected or corrupted content, such as parts of an MQTT topic leaking into the message body of a PUBLISH packet.
How can this vulnerability impact me? :
The vulnerability can cause MQTT packets sent to the server to be malformed or corrupted. This may result in unintended data leakage, such as parts of an MQTT topic appearing in the message body. Such corruption can disrupt communication, cause data integrity issues, or potentially expose sensitive information within MQTT messages.