Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61258: n/a

0
High
VulnerabilityCVE-2025-61258cvecve-2025-61258
Published: Tue Dec 09 2025 (12/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Outsystems Platform Server 11.18.1.37828 allows attackers to cause a denial of service via a crafted content-length value mismatching the body length. NOTE: the Supplier indicates that they are unable to reproduce this.

AI-Powered Analysis

AILast updated: 12/24/2025, 16:21:31 UTC

Technical Analysis

CVE-2025-61258 is a vulnerability identified in Outsystems Platform Server version 11.18.1.37828 that allows remote attackers to cause a denial of service (DoS) condition. The issue stems from improper handling of the HTTP Content-Length header, where a crafted request contains a content-length value that does not match the actual length of the HTTP body. This mismatch can lead the server to enter an unstable state, potentially crashing or becoming unresponsive, thereby denying legitimate users access to services. The vulnerability is classified under CWE-444 (Inconsistent Interpretation of HTTP Requests), highlighting a failure to properly validate and process HTTP headers and body content consistently. The CVSS v3.1 base score is 7.5, indicating a high severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, meaning the attack can be performed remotely without privileges or user interaction and impacts availability only. Despite the supplier's note that they could not reproduce the issue, the vulnerability remains published and unpatched, posing a risk to affected systems. No known exploits have been reported in the wild, but the potential for disruption exists, especially in environments where Outsystems Platform Server is critical for business operations. The lack of a patch necessitates immediate attention to detection and mitigation strategies to prevent exploitation.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to denial of service conditions on Outsystems Platform Server instances, resulting in downtime and disruption of business-critical applications built on this platform. This can affect service availability, leading to operational delays, loss of customer trust, and potential financial losses. Organizations in sectors such as finance, healthcare, and government that rely on Outsystems for rapid application development and deployment may experience significant impact. Additionally, prolonged outages could affect compliance with regulatory requirements related to service availability and incident response. Given the remote and unauthenticated nature of the attack, threat actors could easily target exposed servers, increasing the risk of widespread disruption. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop proof-of-concept exploits. The inability of the supplier to reproduce the issue may delay patch development, prolonging exposure.

Mitigation Recommendations

1. Implement strict network-level filtering to restrict access to Outsystems Platform Server to trusted IP addresses and internal networks only. 2. Deploy web application firewalls (WAFs) capable of detecting and blocking malformed HTTP requests, specifically those with inconsistent Content-Length headers. 3. Monitor server logs and network traffic for anomalies such as mismatched content-length values or repeated malformed requests indicative of attempted exploitation. 4. Establish rate limiting on HTTP requests to reduce the risk of DoS attacks exploiting this vulnerability. 5. Engage with Outsystems support and subscribe to security advisories to obtain patches or workarounds as soon as they become available. 6. Conduct internal testing to attempt reproduction of the issue in a controlled environment to better understand potential impacts and develop custom mitigations. 7. Prepare incident response plans to quickly address service disruptions potentially caused by exploitation attempts. 8. Consider deploying redundancy and failover mechanisms to maintain service availability in case of an attack.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693867ed74ebaa3babafb8b7

Added to database: 12/9/2025, 6:18:21 PM

Last enriched: 12/24/2025, 4:21:31 PM

Last updated: 2/7/2026, 1:13:22 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats