CVE-2025-59789
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-01

Last updated on: 2025-12-02

Assigner: Apache Software Foundation

Description
Uncontrolled recursion in the json2pb component in Apache bRPC (version < 1.15.0) on all platforms allows remote attackers to make the server crash via sending deep recursive json data. Root Cause: The bRPCΒ json2pb component uses rapidjson to parse json data from the network. The rapidjson parser uses a recursive parsing method by default. If the input json has a large depth of recursive structure, the parser function may run into stack overflow. Affected Scenarios: Use bRPC server with protobuf message to serve http+json requests from untrusted network. Or directly useΒ JsonToProtoMessage to convert json fromΒ untrusted input. How to Fix: (Choose one of the following options)Β  1. Upgrade bRPC to version 1.15.0, which fixes this issue. 2. Apply this patch: https://github.com/apache/brpc/pull/3099 Note: No matter which option you choose, you should know that the fix introduces a recursion depth limit with default value 100. It affects these functions:Β  ProtoMessageToJson, ProtoMessageToProtoJson, JsonToProtoMessage, and ProtoJsonToProtoMessage. If your requests contain json or protobuf messages that have a depth exceeding the limit, the request will be failed after applying the fix. You can modify the gflag json2pb_max_recursion_depth to change the limit.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-01
Last Modified
2025-12-02
Generated
2026-05-07
AI Q&A
2025-12-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache brpc to 1.15.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-674 The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an uncontrolled recursion issue in the json2pb component of Apache bRPC versions before 1.15.0. The component uses the rapidjson parser, which parses JSON data recursively by default. If an attacker sends JSON data with a very deep recursive structure, it can cause the parser to run into a stack overflow, leading to a server crash.


How can this vulnerability impact me? :

An attacker can exploit this vulnerability by sending deeply nested JSON data to a bRPC server using protobuf messages. This can cause the server to crash due to stack overflow, resulting in denial of service and potential disruption of services.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should either upgrade bRPC to version 1.15.0 which fixes the issue, or apply the patch available at https://github.com/apache/brpc/pull/3099. Additionally, be aware that the fix introduces a recursion depth limit (default 100) affecting json2pb functions, and you can adjust this limit using the gflag json2pb_max_recursion_depth if needed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart