/
DirectorySecurity AdvisoriesPricing
Sign in
Security Advisories

CVE-2025-62727

Published

Last updated

NVD

https://nvd.nist.gov/vuln/detail/CVE-2025-62727

Severity

7.5

High

CVSS V3

Summary

Starlette vulnerable to O(n^2) DoS via Range header merging in starlette.responses.FileResponse

Description

Starlette is a lightweight ASGI framework/toolkit. Prior to 0.49.1 , an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing in Starlette's FileResponse Range parsing/merging logic. This enables CPU exhaustion per request, causing denial‑of‑service for endpoints serving files (e.g., StaticFiles or any use of FileResponse). This vulnerability is fixed in 0.49.1.

References

Affected packages


Safe Source for Open Source™
Contact us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard ContainersChainguard LibrariesChainguard VMsIntegrationsPricing