CVE-2025-53633: Chall-Manager's scenario decoding process does not check for zip bombs
When decoding a scenario (i.e. a zip archive), the size of the decoded content is not checked, potentially leading to zip bombs decompression. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system.
References
- github.com/advisories/GHSA-r7fm-3pqm-ww5w
- github.com/ctfer-io/chall-manager
- github.com/ctfer-io/chall-manager/commit/14042aa66a577caee777e10fe09adcf2587d20dd
- github.com/ctfer-io/chall-manager/releases/tag/v0.1.4
- github.com/ctfer-io/chall-manager/security/advisories/GHSA-r7fm-3pqm-ww5w
- nvd.nist.gov/vuln/detail/CVE-2025-53633
Code Behaviors & Features
Detect and mitigate CVE-2025-53633 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →