CVE-2025-71031
Denial of Service via Excessive HTTP Headers in Water-Melon Melon
Publication date: 2026-02-04
Last updated on: 2026-02-25
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| melang | melon | to 2025-01-18 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Water-Melon Melon software, specifically in commit 9df9292 and earlier versions. The issue is that the HTTP component does not enforce any maximum length on request headers. Because of this, an attacker can send an excessively large request header which consumes a large amount of RAM memory, leading to a denial of service.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a Denial of Service (DoS). By sending an HTTP request with an excessively large header, an attacker can cause the affected system to consume excessive RAM memory, potentially making the system unresponsive or crashing it. This can disrupt normal operations and availability of services relying on the Water-Melon Melon software.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know