CVE-2023-30798: CWE-400 Uncontrolled Resource Consumption in Encode Starlette
There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service.
AI Analysis
Technical Summary
CVE-2023-30798 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the Encode Starlette Python framework, specifically in versions prior to 0.25.0. The issue arises from the MultipartParser component, which processes multipart form data in HTTP requests. An unauthenticated remote attacker can exploit this flaw by crafting HTTP requests containing an excessive number of form fields or file uploads. Because the parser does not impose limits on the number of parts, this can lead to excessive memory consumption on the server. The uncontrolled resource usage can degrade performance or cause the HTTP service to crash, resulting in a denial of service (DoS). The vulnerability does not affect confidentiality or integrity but severely impacts availability. It requires no authentication or user interaction, making it straightforward to exploit remotely. The CVSS v3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) reflects a high-severity DoS vulnerability with network attack vector and low attack complexity. No known exploits have been reported in the wild as of the publication date. The recommended remediation is to upgrade Starlette to version 0.25.0 or later, where this issue is addressed. Additionally, implementing server-side limits on multipart form data size and part counts can mitigate the risk. Monitoring for abnormal multipart request patterns can help detect exploitation attempts early.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of web services built on the Starlette framework. A successful attack can lead to service outages, disrupting business operations, customer access, and critical online services. This is particularly impactful for sectors relying on web applications for real-time data processing, e-commerce, or public services. The denial of service can cause reputational damage and financial losses due to downtime. Since the vulnerability is exploitable without authentication, attackers can launch large-scale or targeted DoS attacks with minimal effort. Organizations with limited incident response capabilities or those that have not updated their dependencies are at higher risk. The impact is magnified in environments where Starlette is used as a core component in microservices or API backends, common in modern European IT infrastructures. Additionally, regulatory compliance frameworks in Europe emphasize service availability, so prolonged outages could have legal and compliance repercussions.
Mitigation Recommendations
1. Upgrade the Starlette framework to version 0.25.0 or later immediately to apply the official fix for this vulnerability. 2. Implement strict server-side limits on multipart form data processing, including maximum number of parts, maximum size per part, and total request size, to prevent resource exhaustion. 3. Employ web application firewalls (WAFs) or reverse proxies capable of detecting and blocking abnormal multipart/form-data requests with excessive parts or files. 4. Monitor HTTP request patterns for spikes in multipart form submissions or unusual request sizes that could indicate exploitation attempts. 5. Conduct regular dependency audits and vulnerability scans to ensure all components are up to date. 6. In high-risk environments, consider rate limiting or CAPTCHA challenges on endpoints accepting multipart form data to reduce automated attack feasibility. 7. Prepare incident response plans to quickly identify and mitigate DoS attacks targeting this vulnerability. 8. Educate development and operations teams about secure handling of multipart data and resource management best practices.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2023-30798: CWE-400 Uncontrolled Resource Consumption in Encode Starlette
Description
There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service.
AI-Powered Analysis
Technical Analysis
CVE-2023-30798 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the Encode Starlette Python framework, specifically in versions prior to 0.25.0. The issue arises from the MultipartParser component, which processes multipart form data in HTTP requests. An unauthenticated remote attacker can exploit this flaw by crafting HTTP requests containing an excessive number of form fields or file uploads. Because the parser does not impose limits on the number of parts, this can lead to excessive memory consumption on the server. The uncontrolled resource usage can degrade performance or cause the HTTP service to crash, resulting in a denial of service (DoS). The vulnerability does not affect confidentiality or integrity but severely impacts availability. It requires no authentication or user interaction, making it straightforward to exploit remotely. The CVSS v3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) reflects a high-severity DoS vulnerability with network attack vector and low attack complexity. No known exploits have been reported in the wild as of the publication date. The recommended remediation is to upgrade Starlette to version 0.25.0 or later, where this issue is addressed. Additionally, implementing server-side limits on multipart form data size and part counts can mitigate the risk. Monitoring for abnormal multipart request patterns can help detect exploitation attempts early.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of web services built on the Starlette framework. A successful attack can lead to service outages, disrupting business operations, customer access, and critical online services. This is particularly impactful for sectors relying on web applications for real-time data processing, e-commerce, or public services. The denial of service can cause reputational damage and financial losses due to downtime. Since the vulnerability is exploitable without authentication, attackers can launch large-scale or targeted DoS attacks with minimal effort. Organizations with limited incident response capabilities or those that have not updated their dependencies are at higher risk. The impact is magnified in environments where Starlette is used as a core component in microservices or API backends, common in modern European IT infrastructures. Additionally, regulatory compliance frameworks in Europe emphasize service availability, so prolonged outages could have legal and compliance repercussions.
Mitigation Recommendations
1. Upgrade the Starlette framework to version 0.25.0 or later immediately to apply the official fix for this vulnerability. 2. Implement strict server-side limits on multipart form data processing, including maximum number of parts, maximum size per part, and total request size, to prevent resource exhaustion. 3. Employ web application firewalls (WAFs) or reverse proxies capable of detecting and blocking abnormal multipart/form-data requests with excessive parts or files. 4. Monitor HTTP request patterns for spikes in multipart form submissions or unusual request sizes that could indicate exploitation attempts. 5. Conduct regular dependency audits and vulnerability scans to ensure all components are up to date. 6. In high-risk environments, consider rate limiting or CAPTCHA challenges on endpoints accepting multipart form data to reduce automated attack feasibility. 7. Prepare incident response plans to quickly identify and mitigate DoS attacks targeting this vulnerability. 8. Educate development and operations teams about secure handling of multipart data and resource management best practices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2023-04-18T10:31:45.962Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69209279b50ca2a0e366a940
Added to database: 11/21/2025, 4:25:29 PM
Last enriched: 11/21/2025, 4:29:05 PM
Last updated: 1/7/2026, 5:25:17 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.