Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59045: CWE-770: Allocation of Resources Without Limits or Throttling in stalwartlabs stalwart

0
High
VulnerabilityCVE-2025-59045cvecve-2025-59045cwe-770
Published: Wed Sep 10 2025 (09/10/2025, 16:09:49 UTC)
Source: CVE Database V5
Vendor/Project: stalwartlabs
Product: stalwart

Description

Stalwart is a mail and collaboration server. Starting in version 0.12.0 and prior to version 0.13.3, a memory exhaustion vulnerability exists in Stalwart's CalDAV implementation that allows authenticated attackers to cause denial-of-service by triggering unbounded memory consumption through recurring event expansion. An authenticated attacker can crash the Stalwart server by creating recurring events with large payloads and triggering their expansion through CalDAV REPORT requests. A single malicious request expanding 300 events with 1000-character descriptions can consume up to 2 GB of memory. The vulnerability exists in the `ArchivedCalendarEventData.expand` function, which processes CalDAV `REPORT` requests with event expansion. When a client requests recurring events in their expanded form using the `<C:expand>` element, the server stores all expanded event instances in memory without enforcing size limits. Users should upgrade to Stalwart version 0.13.3 or later to receive a fix. If immediate upgrading is not possible, implement memory limits at the container/system level; monitor server memory usage for unusual spikes; consider rate limiting CalDAV REPORT requests; and restrict CalDAV access to trusted users only.

AI-Powered Analysis

AILast updated: 09/18/2025, 00:46:10 UTC

Technical Analysis

CVE-2025-59045 is a high-severity memory exhaustion vulnerability affecting the Stalwart mail and collaboration server, specifically in versions from 0.12.0 up to but not including 0.13.3. The flaw resides in the CalDAV implementation's handling of recurring event expansions within the ArchivedCalendarEventData.expand function. When a client issues a CalDAV REPORT request with the <C:expand> element to retrieve recurring events in their expanded form, the server processes and stores all expanded event instances in memory without imposing any limits on the size or number of these expansions. An authenticated attacker can exploit this by creating recurring calendar events with large payloads—such as descriptions of 1000 characters—and then triggering their expansion. For example, expanding 300 such events can consume approximately 2 GB of memory, leading to server resource exhaustion and a denial-of-service (DoS) condition. This vulnerability requires attacker authentication but no user interaction or elevated privileges beyond authenticated access. The root cause is CWE-770: Allocation of Resources Without Limits or Throttling, which allows unbounded memory consumption. No known exploits are currently reported in the wild. The vendor has addressed this issue in Stalwart version 0.13.3 and later.

Potential Impact

For European organizations using Stalwart as their mail and collaboration server, this vulnerability poses a significant risk of service disruption. The DoS condition caused by memory exhaustion can lead to server crashes, impacting availability of email and calendar services critical for business operations. This can affect productivity and potentially delay communications, especially in sectors relying heavily on collaboration tools such as finance, government, healthcare, and education. Since the vulnerability requires authenticated access, insider threats or compromised user accounts could be leveraged to launch attacks. Additionally, denial-of-service incidents may cascade into broader operational impacts if backup or failover systems are not properly configured. The lack of size limits on recurring event expansions also opens the door for attackers to craft malicious calendar data that can degrade server performance over time, potentially leading to repeated outages or increased operational costs for remediation and monitoring.

Mitigation Recommendations

The primary mitigation is to upgrade Stalwart servers to version 0.13.3 or later, where this vulnerability is fixed. If immediate upgrading is not feasible, organizations should implement strict memory limits at the container or operating system level to prevent a single process from exhausting system memory. Monitoring tools should be configured to alert on unusual memory usage spikes associated with the Stalwart service. Rate limiting CalDAV REPORT requests, especially those involving event expansions, can reduce the risk of abuse. Access controls should be tightened to restrict CalDAV access to trusted and verified users only, minimizing the attack surface. Additionally, auditing calendar event creation for unusually large or suspicious recurring events can help detect potential exploitation attempts. Network segmentation and application-layer firewalls can also be employed to limit exposure of the CalDAV service to internal or trusted networks. Finally, incident response plans should include procedures for quickly identifying and mitigating DoS conditions related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-08T16:19:26.172Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c1a33d65b18cd0836584b8

Added to database: 9/10/2025, 4:11:41 PM

Last enriched: 9/18/2025, 12:46:10 AM

Last updated: 10/29/2025, 9:36:41 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats