CVE-2025-51846
Awaiting Analysis Awaiting Analysis - Queue
Denial of Service in CryptPad via WebSocket Flood

Publication date: 2026-04-30

Last updated on: 2026-05-04

Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government

Description
CryptPad 2025.3.1 allows unbounded WebSocket frame flood. A remote, unauthenticated attacker can significantly degrade or deny service for all users of a CryptPad instance. Fixed in 2026.2.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
xwiki cryptpad From 2025.3.1 (inc) to 2026.2.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-51846 is a vulnerability in CryptPad version 2025.3.1 that allows an unbounded WebSocket frame flood.

This means a remote, unauthenticated attacker can send a large number of valid WebSocket frames without limits, exploiting the lack of cumulative limits on data and fragments processed per connection.

Although individual WebSocket frames are checked for size, the overall number of frames or fragments is not limited, which can exhaust server resources such as CPU and memory.

As a result, the attacker can cause significant degradation or denial of service for all users of a CryptPad instance.

The issue is classified under CWE-770 (allocation of resources without limits or throttling) and was fixed in CryptPad version 2026.2.2.


How can this vulnerability impact me? :

This vulnerability can be exploited by a remote, unauthenticated attacker to significantly degrade or deny service to all users of a CryptPad instance.

By flooding the server with numerous valid WebSocket frames, the attacker can exhaust server CPU and memory resources.

This resource exhaustion can lead to service degradation, unavailability, or even crashes, preventing legitimate users from accessing the service.

The impact is a high-severity denial-of-service condition that affects availability.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves an unbounded WebSocket frame flood that can cause resource exhaustion on the CryptPad server. Detection involves monitoring for abnormal WebSocket traffic patterns, such as unusually high volumes of WebSocket frames or fragmented messages from unauthenticated sources.

Suggested detection methods include monitoring WebSocket connections for excessive frame rates or data volume per connection, and checking server resource usage (CPU and memory) for spikes correlated with WebSocket traffic.

While no specific commands are provided in the resources, typical commands to monitor WebSocket traffic and resource usage might include:

  • Using network monitoring tools like tcpdump or Wireshark to capture and analyze WebSocket frames on the relevant ports.
  • Using system monitoring commands such as `top`, `htop`, or `vmstat` to observe CPU and memory usage spikes.
  • Checking web server logs or reverse proxy logs for unusually high numbers of WebSocket connection attempts or frame rates.

What immediate steps should I take to mitigate this vulnerability?

The primary and most effective mitigation is to upgrade CryptPad to version 2026.2.2 or later, where the vulnerability has been fixed.

Additional immediate mitigations include implementing rate limiting on WebSocket connections to prevent abuse, such as:

  • Configuring reverse-proxy rate limiting (e.g., in nginx) to limit the number of WebSocket frames or requests per minute per IP.
  • Setting per-IP connection limits to reduce the risk of a single attacker overwhelming the server.
  • Applying cumulative per-connection byte/frame limits to restrict resource consumption.

Monitoring WebSocket traffic for abnormal patterns can also help detect and respond to ongoing attacks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of the CryptPad WebSocket frame flood vulnerability (CVE-2025-51846) on compliance with common standards and regulations such as GDPR or HIPAA.

However, since the vulnerability allows a remote, unauthenticated attacker to cause denial of service or significant degradation of service, it could indirectly affect compliance by impacting availability requirements mandated by some regulations.

No explicit references to regulatory compliance implications or data protection concerns are mentioned in the available resources.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart