CVE-2025-9648

NameCVE-2025-9648
DescriptionA vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to trigger a denial of service (DoS) condition. By sending a specially crafted HTTP POST request containing a null byte in the payload, the server enters an infinite loop during form data parsing. Multiple malicious requests will result in complete CPU exhaustion and render the service unresponsive to further requests. This issue was fixed in commit 782e189. This issue affects only the library, standalone executable pre-built by vendor is not affected.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
civetweb (PTS)bullseye1.13+dfsg-5vulnerable
bookworm1.15+dfsg-4vulnerable
forky, trixie1.16+dfsg-2vulnerable
sid1.16+dfsg-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
civetwebsource(unstable)(unfixed)

Notes

[bullseye] - civetweb <postponed> (minor issue; DoS)
https://github.com/civetweb/civetweb/issues/1348
https://github.com/civetweb/civetweb/commit/782e18903515f43bafbf2e668994e82bdfa51133

Search for package or bug name: Reporting problems