Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40928: CWE-122 Heap-based Buffer Overflow in MLEHMANN JSON::XS

0
High
VulnerabilityCVE-2025-40928cvecve-2025-40928cwe-122
Published: Mon Sep 08 2025 (09/08/2025, 15:08:21 UTC)
Source: CVE Database V5
Vendor/Project: MLEHMANN
Product: JSON::XS

Description

JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact

AI-Powered Analysis

AILast updated: 11/10/2025, 20:26:19 UTC

Technical Analysis

CVE-2025-40928 is a heap-based buffer overflow vulnerability identified in the JSON::XS Perl module, versions prior to 4.04. JSON::XS is widely used for efficient JSON parsing in Perl applications. The vulnerability arises from an integer buffer overflow during the parsing of crafted JSON data, which leads to a segmentation fault (crash) of the application using the module. This flaw is classified under CWE-122, indicating a heap-based buffer overflow, which can corrupt memory and cause application instability. The vulnerability can be triggered remotely without any authentication or user interaction, as it only requires the processing of malicious JSON input. The impact is primarily denial-of-service (DoS), as the crash disrupts normal application operation. No direct confidentiality or integrity compromise is reported, and no known exploits have been observed in the wild to date. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects all versions before 4.04, and no official patches or mitigations were linked at the time of publication, though upgrading to version 4.04 or later is implied as the fix. The vulnerability was reserved in April 2025 and published in September 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to availability of services relying on Perl-based JSON processing, such as web applications, APIs, and backend services. A successful exploit can cause application crashes, leading to denial-of-service conditions that disrupt business operations, customer access, and potentially critical infrastructure functions. While confidentiality and integrity are not directly impacted, the loss of availability can have cascading effects, including financial losses, reputational damage, and operational delays. Organizations in sectors with high reliance on Perl and JSON::XS, such as finance, government, telecommunications, and healthcare, may face increased risk. Additionally, automated systems and IoT devices using Perl scripts for JSON handling could be affected, amplifying the impact. The lack of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation and network accessibility necessitate urgent attention.

Mitigation Recommendations

1. Immediately upgrade all instances of JSON::XS to version 4.04 or later, where the vulnerability is fixed. 2. Conduct a thorough audit of all Perl applications and services to identify usage of JSON::XS and assess exposure. 3. Implement input validation and sanitization to detect and reject malformed or suspicious JSON payloads before parsing. 4. Deploy runtime protections such as application-level monitoring and crash detection to quickly identify and respond to abnormal terminations. 5. Use containerization or sandboxing to isolate vulnerable components and limit the blast radius of potential crashes. 6. Establish network-level controls to restrict access to services that parse JSON from untrusted sources. 7. Maintain up-to-date backups and incident response plans to recover quickly from denial-of-service events. 8. Monitor security advisories and community resources for any emerging exploits or patches related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CPANSec
Date Reserved
2025-04-16T09:05:34.363Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68bef375d5a2966cfc808efd

Added to database: 9/8/2025, 3:17:09 PM

Last enriched: 11/10/2025, 8:26:19 PM

Last updated: 12/12/2025, 9:44:22 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats