CVE-2025-46727 — Uncontrolled Resource Consumption in Rack
Severity
7.5HIGHNVD
OSV4.2
EPSS
0.8%
top 25.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 7
Latest updateJan 15
Description
Rack is a modular Ruby web server interface. Prior to versions 2.2.14, 3.0.16, and 3.1.14, `Rack::QueryParser` parses query strings and `application/x-www-form-urlencoded` bodies into Ruby data structures without imposing any limit on the number of parameters, allowing attackers to send requests with extremely large numbers of parameters. The vulnerability arises because `Rack::QueryParser` iterates over each `&`-separated key-value pair and adds it to a Hash without enforcing an upper bound on …
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages17 packages
Patches
🔴Vulnerability Details
4📋Vendor Advisories
5Debian▶
CVE-2025-46727: ruby-rack - Rack is a modular Ruby web server interface. Prior to versions 2.2.14, 3.0.16, a...↗2025
Microsoft
▶