EUVD-2025-16936

| CVE-2025-49007 MEDIUM
5.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 17:29 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:29 euvd
EUVD-2025-16936
Patch Released
Mar 14, 2026 - 17:29 nvd
Patch available
CVE Published
Jun 04, 2025 - 23:15 nvd
MEDIUM 5.3

Description

Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.

Analysis

Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. Version 3.1.16 contains a patch for the vulnerability.

Technical Context

A denial of service vulnerability allows an attacker to disrupt the normal functioning of a system, making it unavailable to legitimate users. This vulnerability is classified as Allocation of Resources Without Limits or Throttling (CWE-770).

Affected Products

Affected products: Rack Rack

Remediation

A vendor patch is available — apply it immediately. Implement rate limiting and input validation. Use timeout mechanisms for resource-intensive operations. Deploy DDoS protection where applicable.

Priority Score

27
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +26
POC: 0

Vendor Status

Ubuntu

Priority: Medium
ruby-rack
Release Status Version
oracular ignored end of life, was needs-triage
bionic not-affected -
focal not-affected -
jammy not-affected -
noble not-affected -
plucky not-affected -
trusty not-affected -
upstream released 3.1.16
xenial not-affected -

Debian

Bug #1107363
ruby-rack
Release Status Fixed Version Urgency
bullseye not-affected - -
bullseye (security) fixed 2.1.4-3+deb11u4 -
bookworm, bookworm (security) fixed 2.2.20-0+deb12u1 -
trixie (security), trixie fixed 3.1.18-1~deb13u1 -
forky fixed 3.1.18-1 -
sid fixed 3.2.5-1 -
bookworm not-affected - -
(unstable) fixed 3.1.16-0.1 -

Share

EUVD-2025-16936 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy