CVE-2025-59398: CWE-392 Missing Report of Error Condition in EVerest libocpp
The OCPP implementation in libocpp before 0.26.2 allows a denial of service (EVerest crash) via JSON input larger than 255 characters, because a CiString<255> object is created with StringTooLarge set to Throw.
AI Analysis
Technical Summary
CVE-2025-59398 is a vulnerability identified in the EVerest project's libocpp library, which implements the Open Charge Point Protocol (OCPP). The flaw arises from improper handling of JSON input sizes within the library. Specifically, libocpp versions prior to 0.26.2 utilize a CiString template class instantiated with a maximum size of 255 characters (CiString<255>). When JSON input exceeds this size, the CiString object is configured with the StringTooLarge policy set to Throw, causing an exception to be thrown. However, the library lacks proper error reporting or handling mechanisms for this condition (classified as CWE-392: Missing Report of Error Condition). As a result, when oversized JSON input is processed, it leads to an unhandled exception that crashes the EVerest application, effectively causing a denial of service (DoS). The vulnerability does not impact confidentiality or integrity but affects availability by crashing the service. The CVSS v3.1 score is 3.1 (low severity), reflecting the limited impact and the requirement for an attacker to have network access with high attack complexity and no privileges or user interaction. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is relevant for any deployment using libocpp versions before 0.26.2, particularly in environments where OCPP is used to manage electric vehicle charging stations, as malformed or maliciously crafted JSON payloads exceeding 255 characters can disrupt service availability.
Potential Impact
For European organizations, especially those involved in electric vehicle infrastructure and smart grid management, this vulnerability could disrupt charging station operations by causing the OCPP service to crash upon receiving oversized JSON messages. This denial of service could lead to temporary unavailability of charging services, impacting end-users and potentially causing operational delays. While the impact is limited to availability and does not compromise data confidentiality or integrity, the disruption could affect service reliability and customer trust. Given the increasing adoption of electric vehicles and the EU's emphasis on sustainable transport, any interruption in charging infrastructure could have broader implications for mobility and energy management. Organizations relying on libocpp in their charging station software stacks should be aware of this risk, particularly in environments exposed to untrusted networks or where attackers might send crafted JSON payloads. However, the high attack complexity and lack of known exploits reduce the immediate risk level.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Upgrade libocpp to version 0.26.2 or later, where this issue is addressed. 2) Implement input validation and size checks on JSON payloads before processing to ensure they do not exceed expected limits, thereby preventing exceptions from being thrown. 3) Enhance error handling in the OCPP implementation to gracefully manage exceptions caused by oversized inputs, avoiding service crashes. 4) Deploy network-level protections such as firewalls or intrusion detection systems configured to detect and block anomalous or oversized JSON payloads targeting OCPP endpoints. 5) Monitor logs and application behavior for signs of repeated crashes or malformed input attempts, enabling early detection of exploitation attempts. 6) Where possible, restrict network access to OCPP services to trusted sources to reduce exposure to malicious inputs. These steps go beyond generic advice by focusing on proactive input validation, robust error handling, and network-level controls tailored to the OCPP protocol context.
Affected Countries
Germany, France, Netherlands, Norway, United Kingdom, Sweden
CVE-2025-59398: CWE-392 Missing Report of Error Condition in EVerest libocpp
Description
The OCPP implementation in libocpp before 0.26.2 allows a denial of service (EVerest crash) via JSON input larger than 255 characters, because a CiString<255> object is created with StringTooLarge set to Throw.
AI-Powered Analysis
Technical Analysis
CVE-2025-59398 is a vulnerability identified in the EVerest project's libocpp library, which implements the Open Charge Point Protocol (OCPP). The flaw arises from improper handling of JSON input sizes within the library. Specifically, libocpp versions prior to 0.26.2 utilize a CiString template class instantiated with a maximum size of 255 characters (CiString<255>). When JSON input exceeds this size, the CiString object is configured with the StringTooLarge policy set to Throw, causing an exception to be thrown. However, the library lacks proper error reporting or handling mechanisms for this condition (classified as CWE-392: Missing Report of Error Condition). As a result, when oversized JSON input is processed, it leads to an unhandled exception that crashes the EVerest application, effectively causing a denial of service (DoS). The vulnerability does not impact confidentiality or integrity but affects availability by crashing the service. The CVSS v3.1 score is 3.1 (low severity), reflecting the limited impact and the requirement for an attacker to have network access with high attack complexity and no privileges or user interaction. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is relevant for any deployment using libocpp versions before 0.26.2, particularly in environments where OCPP is used to manage electric vehicle charging stations, as malformed or maliciously crafted JSON payloads exceeding 255 characters can disrupt service availability.
Potential Impact
For European organizations, especially those involved in electric vehicle infrastructure and smart grid management, this vulnerability could disrupt charging station operations by causing the OCPP service to crash upon receiving oversized JSON messages. This denial of service could lead to temporary unavailability of charging services, impacting end-users and potentially causing operational delays. While the impact is limited to availability and does not compromise data confidentiality or integrity, the disruption could affect service reliability and customer trust. Given the increasing adoption of electric vehicles and the EU's emphasis on sustainable transport, any interruption in charging infrastructure could have broader implications for mobility and energy management. Organizations relying on libocpp in their charging station software stacks should be aware of this risk, particularly in environments exposed to untrusted networks or where attackers might send crafted JSON payloads. However, the high attack complexity and lack of known exploits reduce the immediate risk level.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Upgrade libocpp to version 0.26.2 or later, where this issue is addressed. 2) Implement input validation and size checks on JSON payloads before processing to ensure they do not exceed expected limits, thereby preventing exceptions from being thrown. 3) Enhance error handling in the OCPP implementation to gracefully manage exceptions caused by oversized inputs, avoiding service crashes. 4) Deploy network-level protections such as firewalls or intrusion detection systems configured to detect and block anomalous or oversized JSON payloads targeting OCPP endpoints. 5) Monitor logs and application behavior for signs of repeated crashes or malformed input attempts, enabling early detection of exploitation attempts. 6) Where possible, restrict network access to OCPP services to trusted sources to reduce exposure to malicious inputs. These steps go beyond generic advice by focusing on proactive input validation, robust error handling, and network-level controls tailored to the OCPP protocol context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c85fca5c6c1197c2b41eb9
Added to database: 9/15/2025, 6:49:46 PM
Last enriched: 9/15/2025, 6:50:23 PM
Last updated: 9/17/2025, 1:23:06 AM
Views: 7
Related Threats
CVE-2025-9971: CWE-306 Missing Authentication for Critical Function in Planet Technology ICG-2510WG-LTE (EU/US)
CriticalCVE-2025-9450: CWE-457 Use of Uninitialized Variable in Dassault Systèmes SOLIDWORKS eDrawings
HighCVE-2025-9449: CWE-416 Use After Free in Dassault Systèmes SOLIDWORKS eDrawings
HighCVE-2025-9447: CWE-125 Out-of-bounds Read in Dassault Systèmes SOLIDWORKS eDrawings
HighCVE-2025-59307: Unquoted search path or element in Century Corporation RAID Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.