CVE-2025-9648Improper Neutralization of Null Byte or NUL Character in Civetweb

Severity
8.7HIGHNVD
EPSS
1.9%
top 16.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 29

Description

A vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to trigger a denial of service (DoS) condition. By sending a specially crafted HTTP POST request containing a null byte in the payload, the server enters an infinite loop during form data parsing. Multiple malicious requests will result in complete CPU exhaustion and render the service unresponsive to further requests. This issue was fixed in commit 782e189. This issue affects only the library, sta

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Packages5 packages

debiandebian/civetweb< civetweb 1.16+dfsg-4 (forky)
Debiancivetweb_project/civetweb< 1.16+dfsg-2+deb13u1+1
CVEListV5civetweb/civetweb1.101.16

🔴Vulnerability Details

2
GHSA
GHSA-2gxg-pvm2-2p6x: A vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to trigger a denial of service (DoS) condition2025-09-29
OSV
CVE-2025-9648: A vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to trigger a denial of service (DoS) condition2025-09-29

📋Vendor Advisories

3
Red Hat
civetweb: Denial of Service in CivetWeb2025-09-29
Microsoft
Denial of Service in CivetWeb2025-09-09
Debian
CVE-2025-9648: civetweb - A vulnerability in the CivetWeb library's function mg_handle_form_request allows...2025