CVE-2025-65519
Received Received - Intake
Denial of Service via Nested JSON/XML in ezbookkeeping

Publication date: 2026-02-18

Last updated on: 2026-02-20

Assigner: MITRE

Description
mayswind ezbookkeeping versions 1.2.0 and earlier contain a critical vulnerability in JSON and XML file import processing. The application fails to validate nesting depth during parsing operations, allowing authenticated attackers to trigger denial of service conditions by uploading deeply nested malicious files. This results in CPU exhaustion, service degradation, or complete service unavailability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-18
Last Modified
2026-02-20
Generated
2026-05-07
AI Q&A
2026-02-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mayswind ezbookkeeping to 1.2.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-674 The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2025-65519 is a critical vulnerability in mayswind ezbookkeeping versions 1.2.0 and earlier that affects the JSON and XML file import processing modules.'}, {'type': 'paragraph', 'content': 'The vulnerability arises because the application does not validate the nesting depth of JSON or XML files during parsing. This lack of validation allows authenticated attackers to upload deeply nested malicious files that cause uncontrolled recursion.'}, {'type': 'paragraph', 'content': 'As a result, the parsing process consumes excessive CPU and memory resources, leading to stack exhaustion, service degradation, or complete service unavailability (denial of service).'}, {'type': 'list_item', 'content': 'Affected components include JSON import, GnuCash XML import, OFX/QFX XML import, and CAMT.053 XML import modules.'}, {'type': 'list_item', 'content': "The root cause is the use of Go's standard encoding/json and encoding/xml libraries without limits on recursion depth."}, {'type': 'list_item', 'content': 'Attack requires an authenticated user to upload malicious files to the API endpoint.'}] [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unusually high CPU and memory usage on the system hosting ezBookkeeping, especially during import operations of JSON or XML files.'}, {'type': 'paragraph', 'content': 'Since the attack involves uploading deeply nested JSON or XML files to the API endpoint /api/v1/transactions/parse_import.json, network traffic analysis can help detect repeated or large import requests.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect potential exploitation attempts include:'}, {'type': 'list_item', 'content': 'Use system monitoring tools like top or htop to check CPU and memory usage: `top` or `htop`'}, {'type': 'list_item', 'content': 'Check for high CPU usage by the ezBookkeeping process: `ps aux --sort=-%cpu | grep ezbookkeeping`'}, {'type': 'list_item', 'content': "Monitor network traffic for repeated POST requests to the import API endpoint using tools like tcpdump or Wireshark: `tcpdump -i any -A 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)'` and filter for `/api/v1/transactions/parse_import.json` in HTTP payloads."}, {'type': 'list_item', 'content': "Review web server logs for frequent or large import requests: `grep '/api/v1/transactions/parse_import.json' /var/log/nginx/access.log`"}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Enforce request timeouts in the web server configuration, such as setting ReadTimeout and WriteTimeout to 10 seconds.
  • Configure a Web Application Firewall (WAF) or reverse proxy (e.g., Nginx) to limit client body size and set connection timeouts.
  • Implement rate limiting on import requests, for example, allowing a maximum of 10 import requests per hour per user.

If an attack occurs, recovery requires manually restarting the affected container or service to restore normal operation.


How can this vulnerability impact me? :

This vulnerability can cause a denial of service (DoS) condition by exhausting CPU and memory resources on the server running ezbookkeeping.

An attacker with valid authentication can upload deeply nested malicious JSON or XML files that trigger uncontrolled recursion during parsing.

The impact includes complete service disruption, making the application unavailable to legitimate users.

Additionally, the attack leads to high CPU and memory consumption, potentially crashing the service or container.

There is no impact on data confidentiality or integrity, meaning no data leakage or corruption occurs.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart