Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53154: CWE-125 Out-of-bounds Read in cJSON project cJSON

0
Low
VulnerabilityCVE-2023-53154cvecve-2023-53154cwe-125
Published: Fri May 23 2025 (05/23/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: cJSON project
Product: cJSON

Description

parse_string in cJSON before 1.7.18 has a heap-based buffer over-read via {"1":1, with no trailing newline if cJSON_ParseWithLength is called.

AI-Powered Analysis

AILast updated: 11/03/2025, 20:25:33 UTC

Technical Analysis

CVE-2023-53154 is a heap-based buffer over-read vulnerability identified in the cJSON library, a widely used lightweight JSON parser in C. The flaw exists in the parse_string function prior to version 1.7.18, triggered when cJSON_ParseWithLength processes a malformed JSON input such as {"1":1, without a trailing newline. This malformed input causes the parser to read beyond the allocated heap buffer boundaries, leading to an over-read condition. While this vulnerability does not allow an attacker to gain code execution or leak sensitive data, it can cause the affected application to crash or behave unpredictably, resulting in denial of service (DoS). The CVSS 3.1 base score is 2.9, reflecting low severity due to the requirement of local access, high attack complexity, no privileges, and no user interaction. No known exploits have been reported in the wild, indicating limited current threat. However, the vulnerability is relevant for any software or embedded systems relying on vulnerable cJSON versions for JSON parsing, especially where input validation is insufficient. The lack of a patch link suggests that users should upgrade to cJSON 1.7.18 or later where this issue is resolved.

Potential Impact

For European organizations, the primary impact of CVE-2023-53154 is potential denial of service caused by application crashes when processing maliciously crafted JSON inputs. This can disrupt services, particularly in environments where cJSON is embedded in critical infrastructure, IoT devices, or industrial control systems. Although the vulnerability does not compromise confidentiality or integrity, availability interruptions can affect operational continuity and service reliability. Organizations with automated systems or APIs that parse JSON data locally could be vulnerable if they use outdated cJSON versions. The low severity and high complexity of exploitation reduce the immediate risk, but targeted attacks or accidental crashes remain possible. Industries such as manufacturing, telecommunications, and software development in Europe that embed cJSON in their products or services should be aware of this risk.

Mitigation Recommendations

To mitigate CVE-2023-53154, European organizations should: 1) Upgrade all instances of the cJSON library to version 1.7.18 or later where the vulnerability is fixed. 2) Conduct an inventory of software and embedded systems using cJSON to identify vulnerable versions. 3) Implement strict input validation and sanitization on JSON data before parsing, especially for inputs from untrusted sources. 4) Employ runtime monitoring and anomaly detection to identify abnormal crashes or parsing failures indicative of exploitation attempts. 5) For critical systems, consider sandboxing JSON parsing operations to contain potential crashes. 6) Collaborate with software vendors and developers to ensure timely patching and secure coding practices around JSON handling. 7) Review and update incident response plans to include handling of denial of service events caused by malformed inputs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-23T00:00:00.000Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6830962c0acd01a249273faf

Added to database: 5/23/2025, 3:37:16 PM

Last enriched: 11/3/2025, 8:25:33 PM

Last updated: 11/22/2025, 4:44:51 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats