CVE-2025-64508: Bugsink is vulnerable to unauthenticated remote DoS via crafted Brotli input
In affected versions, brotli “bombs” (highly compressed brotli streams, such as many zeros) can be sent to the server. Since the server will attempt to decompress these streams before applying various maximums, this can lead to exhaustion of the available memory and thus a Denial of Service.
This can be done if the DSN is known, which it is in many common setups (JavaScript, Mobile Apps).
References
- github.com/advisories/GHSA-fc2v-vcwj-269v
- github.com/bugsink/bugsink
- github.com/bugsink/bugsink/commit/3f65544aab3ad5303d97009136640de97b0676a5
- github.com/bugsink/bugsink/pull/266
- github.com/bugsink/bugsink/security/advisories/GHSA-fc2v-vcwj-269v
- github.com/google/brotli/commit/67d78bc41db1a0d03f2e763497748f2f69946627
- github.com/google/brotli/issues/1327
- github.com/google/brotli/issues/1375
- github.com/google/brotli/pull/1234
- github.com/google/brotli/releases/tag/v1.2.0
- nvd.nist.gov/vuln/detail/CVE-2025-64508
Code Behaviors & Features
Detect and mitigate CVE-2025-64508 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →