Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55128: Vulnerability in Revive Revive Adserver

0
Medium
VulnerabilityCVE-2025-55128cvecve-2025-55128
Published: Thu Nov 20 2025 (11/20/2025, 19:06:52 UTC)
Source: CVE Database V5
Vendor/Project: Revive
Product: Revive Adserver

Description

HackerOne community member Dang Hung Vi (vidang04) has reported an uncontrolled resource consumption vulnerability in the “userlog-index.php”. An attacker with access to the admin interface could request an arbitrarily large number of items per page, potentially leading to a denial of service.

AI-Powered Analysis

AILast updated: 12/04/2025, 20:57:09 UTC

Technical Analysis

CVE-2025-55128 identifies a vulnerability in Revive Adserver version 6, a widely used open-source ad serving platform. The flaw resides in the userlog-index.php script, which handles the display of user logs within the admin interface. Specifically, the vulnerability allows an authenticated administrator to specify an arbitrarily large number of items per page when requesting user log data. This unchecked parameter leads to uncontrolled resource consumption, as the server attempts to process and render an excessive volume of data in a single request. The consequence is a denial of service condition, where server performance degrades or the service becomes entirely unavailable due to resource exhaustion such as CPU, memory, or database load. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption). The attack vector requires network access (remote) and privileges of an authenticated admin user, with no user interaction needed beyond that. The CVSS v3.0 base score is 6.5, indicating a medium severity level, primarily due to the requirement for admin privileges and the impact being limited to availability without affecting confidentiality or integrity. No patches or known exploits are currently available or reported, but the vulnerability is publicly disclosed and should be addressed promptly to prevent potential exploitation.

Potential Impact

For European organizations, the primary impact of this vulnerability is the risk of denial of service affecting the availability of the Revive Adserver platform. Organizations relying on this platform for digital advertising campaigns could experience service outages or degraded performance, disrupting ad delivery and potentially causing financial losses and reputational damage. Since the vulnerability requires admin access, the risk is heightened if admin credentials are compromised or if insider threats exist. The disruption could also affect third-party advertisers and partners relying on the ad server's availability. Given the importance of digital marketing in Europe's economy, especially in countries with large advertising markets, this vulnerability could have a tangible operational impact. However, the absence of confidentiality or integrity impact limits the scope of damage to service availability only.

Mitigation Recommendations

1. Restrict and monitor admin access strictly, employing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Implement rate limiting or input validation on the userlog-index.php page to cap the maximum number of items per page, preventing excessive resource consumption. 3. Regularly audit and monitor server performance and logs for unusual spikes in resource usage or large requests targeting the admin interface. 4. If possible, isolate the ad server environment to limit the impact of potential DoS conditions on other critical systems. 5. Stay updated with Revive Adserver vendor announcements for patches or official fixes and apply them promptly once available. 6. Consider implementing web application firewalls (WAF) rules to detect and block abnormal request patterns targeting the admin interface. 7. Educate administrators on the risks of this vulnerability and encourage best practices for credential security and session management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-08-07T15:00:05.576Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 691f698540b920e2708380e3

Added to database: 11/20/2025, 7:18:29 PM

Last enriched: 12/4/2025, 8:57:09 PM

Last updated: 1/7/2026, 4:51:52 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats