CVE-2025-59045: CWE-770: Allocation of Resources Without Limits or Throttling in stalwartlabs stalwart
Stalwart is a mail and collaboration server. Starting in version 0.12.0 and prior to version 0.13.3, a memory exhaustion vulnerability exists in Stalwart's CalDAV implementation that allows authenticated attackers to cause denial-of-service by triggering unbounded memory consumption through recurring event expansion. An authenticated attacker can crash the Stalwart server by creating recurring events with large payloads and triggering their expansion through CalDAV REPORT requests. A single malicious request expanding 300 events with 1000-character descriptions can consume up to 2 GB of memory. The vulnerability exists in the `ArchivedCalendarEventData.expand` function, which processes CalDAV `REPORT` requests with event expansion. When a client requests recurring events in their expanded form using the `<C:expand>` element, the server stores all expanded event instances in memory without enforcing size limits. Users should upgrade to Stalwart version 0.13.3 or later to receive a fix. If immediate upgrading is not possible, implement memory limits at the container/system level; monitor server memory usage for unusual spikes; consider rate limiting CalDAV REPORT requests; and restrict CalDAV access to trusted users only.
AI Analysis
Technical Summary
CVE-2025-59045 is a high-severity memory exhaustion vulnerability affecting the Stalwart mail and collaboration server, specifically versions from 0.12.0 up to but not including 0.13.3. The flaw resides in the CalDAV implementation, within the ArchivedCalendarEventData.expand function that handles CalDAV REPORT requests involving recurring event expansion. When a client requests recurring calendar events in their expanded form using the <C:expand> element, the server attempts to store all expanded event instances in memory without enforcing any limits on the number or size of these instances. An authenticated attacker can exploit this by creating recurring events with large payloads (e.g., descriptions of 1000 characters) and triggering their expansion through a single CalDAV REPORT request. This can cause unbounded memory consumption, with a single request expanding 300 events potentially consuming up to 2 GB of RAM, leading to denial-of-service (DoS) conditions by crashing the Stalwart server. The vulnerability does not require user interaction and can be triggered remotely by any authenticated user, making it relatively easy to exploit within an environment where Stalwart is deployed. The root cause is the lack of resource allocation limits or throttling during event expansion, classified under CWE-770. The vendor has addressed this issue in Stalwart version 0.13.3 and later. Until upgrading is possible, mitigations include enforcing memory limits at the container or system level, monitoring memory usage for anomalies, rate limiting CalDAV REPORT requests, and restricting CalDAV access to trusted users only.
Potential Impact
For European organizations using Stalwart as their mail and collaboration server, this vulnerability poses a significant risk of service disruption. The ability for an authenticated attacker to cause a denial-of-service by exhausting server memory can lead to downtime, impacting business continuity and productivity. Organizations relying on Stalwart for critical communications and scheduling could face operational delays and potential loss of trust from users. Additionally, repeated exploitation attempts might increase operational costs due to incident response and recovery efforts. Since the vulnerability requires authentication but no user interaction, insider threats or compromised credentials could be leveraged to exploit this flaw. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed. European entities with strict uptime and data availability requirements, such as financial institutions, healthcare providers, and government agencies, could be particularly affected. Furthermore, denial-of-service attacks might be used as a diversion tactic for more sophisticated intrusions.
Mitigation Recommendations
1. Immediate upgrade to Stalwart version 0.13.3 or later is the most effective mitigation, as it contains the fix for this vulnerability. 2. If upgrading is not immediately feasible, implement strict memory limits at the container or operating system level to prevent a single process from consuming excessive RAM. 3. Monitor server memory usage continuously and set up alerts for unusual spikes that could indicate exploitation attempts. 4. Apply rate limiting specifically to CalDAV REPORT requests to reduce the risk of rapid repeated exploitation. 5. Restrict CalDAV access to a minimal set of trusted and authenticated users, employing strong authentication mechanisms and regular credential audits. 6. Consider deploying Web Application Firewalls (WAFs) or API gateways capable of detecting and blocking anomalous CalDAV request patterns. 7. Conduct regular security training for administrators to recognize and respond to potential exploitation attempts. 8. Maintain up-to-date backups and incident response plans to minimize downtime in case of successful attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-59045: CWE-770: Allocation of Resources Without Limits or Throttling in stalwartlabs stalwart
Description
Stalwart is a mail and collaboration server. Starting in version 0.12.0 and prior to version 0.13.3, a memory exhaustion vulnerability exists in Stalwart's CalDAV implementation that allows authenticated attackers to cause denial-of-service by triggering unbounded memory consumption through recurring event expansion. An authenticated attacker can crash the Stalwart server by creating recurring events with large payloads and triggering their expansion through CalDAV REPORT requests. A single malicious request expanding 300 events with 1000-character descriptions can consume up to 2 GB of memory. The vulnerability exists in the `ArchivedCalendarEventData.expand` function, which processes CalDAV `REPORT` requests with event expansion. When a client requests recurring events in their expanded form using the `<C:expand>` element, the server stores all expanded event instances in memory without enforcing size limits. Users should upgrade to Stalwart version 0.13.3 or later to receive a fix. If immediate upgrading is not possible, implement memory limits at the container/system level; monitor server memory usage for unusual spikes; consider rate limiting CalDAV REPORT requests; and restrict CalDAV access to trusted users only.
AI-Powered Analysis
Technical Analysis
CVE-2025-59045 is a high-severity memory exhaustion vulnerability affecting the Stalwart mail and collaboration server, specifically versions from 0.12.0 up to but not including 0.13.3. The flaw resides in the CalDAV implementation, within the ArchivedCalendarEventData.expand function that handles CalDAV REPORT requests involving recurring event expansion. When a client requests recurring calendar events in their expanded form using the <C:expand> element, the server attempts to store all expanded event instances in memory without enforcing any limits on the number or size of these instances. An authenticated attacker can exploit this by creating recurring events with large payloads (e.g., descriptions of 1000 characters) and triggering their expansion through a single CalDAV REPORT request. This can cause unbounded memory consumption, with a single request expanding 300 events potentially consuming up to 2 GB of RAM, leading to denial-of-service (DoS) conditions by crashing the Stalwart server. The vulnerability does not require user interaction and can be triggered remotely by any authenticated user, making it relatively easy to exploit within an environment where Stalwart is deployed. The root cause is the lack of resource allocation limits or throttling during event expansion, classified under CWE-770. The vendor has addressed this issue in Stalwart version 0.13.3 and later. Until upgrading is possible, mitigations include enforcing memory limits at the container or system level, monitoring memory usage for anomalies, rate limiting CalDAV REPORT requests, and restricting CalDAV access to trusted users only.
Potential Impact
For European organizations using Stalwart as their mail and collaboration server, this vulnerability poses a significant risk of service disruption. The ability for an authenticated attacker to cause a denial-of-service by exhausting server memory can lead to downtime, impacting business continuity and productivity. Organizations relying on Stalwart for critical communications and scheduling could face operational delays and potential loss of trust from users. Additionally, repeated exploitation attempts might increase operational costs due to incident response and recovery efforts. Since the vulnerability requires authentication but no user interaction, insider threats or compromised credentials could be leveraged to exploit this flaw. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed. European entities with strict uptime and data availability requirements, such as financial institutions, healthcare providers, and government agencies, could be particularly affected. Furthermore, denial-of-service attacks might be used as a diversion tactic for more sophisticated intrusions.
Mitigation Recommendations
1. Immediate upgrade to Stalwart version 0.13.3 or later is the most effective mitigation, as it contains the fix for this vulnerability. 2. If upgrading is not immediately feasible, implement strict memory limits at the container or operating system level to prevent a single process from consuming excessive RAM. 3. Monitor server memory usage continuously and set up alerts for unusual spikes that could indicate exploitation attempts. 4. Apply rate limiting specifically to CalDAV REPORT requests to reduce the risk of rapid repeated exploitation. 5. Restrict CalDAV access to a minimal set of trusted and authenticated users, employing strong authentication mechanisms and regular credential audits. 6. Consider deploying Web Application Firewalls (WAFs) or API gateways capable of detecting and blocking anomalous CalDAV request patterns. 7. Conduct regular security training for administrators to recognize and respond to potential exploitation attempts. 8. Maintain up-to-date backups and incident response plans to minimize downtime in case of successful attacks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-08T16:19:26.172Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c1a33d65b18cd0836584b8
Added to database: 9/10/2025, 4:11:41 PM
Last enriched: 9/10/2025, 4:11:56 PM
Last updated: 9/10/2025, 5:18:20 PM
Views: 3
Related Threats
CVE-2025-43784: CWE-863: Incorrect Authorization in Liferay Portal
MediumCVE-2025-10201: Inappropriate implementation in Google Chrome
HighCVE-2025-10200: Use after free in Google Chrome
HighCVE-2025-10210: SQL Injection in yanyutao0402 ChanCMS
MediumCVE-2025-54123: CWE-20: Improper Input Validation in SpectoLabs hoverfly
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.