CVE-2025-15284 — Improper Input Validation in Project QS
Severity
6.3MEDIUMNVD
EPSS
0.1%
top 80.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 29
Latest updateFeb 12
Description
Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1.
Summary
The arrayLimit option in qs did not enforce limits for bracket notation (a[]=1&a[]=2), only for indexed notation (a[0]=1). This is a consistency bug; arrayLimit should apply uniformly across all array notations.
Note: The default parameterLimit of 1000 effectively mitigates the DoS scenario originally described. With default options, bracket notation cannot produce arrays la…
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
Affected Packages2 packages
Patches
🔴Vulnerability Details
5OSV▶
CVE-2025-15284: Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS↗2025-12-29
📋Vendor Advisories
3Debian▶
CVE-2025-15284: node-qs - Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.Th...↗2025
🕵️Threat Intelligence
1💬Community
3Bugzilla▶
CVE-2025-15284 python-torch: qs: Denial of Service via improper input validation in array parsing [epel-10]↗2025-12-31
Bugzilla▶
CVE-2025-15284 python-torch: qs: Denial of Service via improper input validation in array parsing [fedora-43]↗2025-12-31
Bugzilla▶
CVE-2025-15284 python-torch: qs: Denial of Service via improper input validation in array parsing [fedora-42]↗2025-12-31