Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65637: n/a

0
Unknown
VulnerabilityCVE-2025-65637cvecve-2025-65637
Published: Thu Dec 04 2025 (12/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.

AI-Powered Analysis

AILast updated: 12/04/2025, 18:39:57 UTC

Technical Analysis

CVE-2025-65637 is a denial-of-service (DoS) vulnerability found in the Go logging library github.com/sirupsen/logrus, specifically in the Entry.Writer() method. The vulnerability occurs when logging a single-line payload exceeding 64KB without newline characters. Internally, logrus uses Go's bufio.Scanner to read input, which has a maximum token size limit. When this limit is exceeded, the scanner returns a "token too long" error, causing the writer pipe to close unexpectedly. This closure renders the Writer() unusable, leading to application unavailability due to the inability to log further data. The affected versions include all versions prior to 1.8.3, 1.9.0, and 1.9.2. The issue was resolved in versions 1.8.3, 1.9.1, and 1.9.3 and later by implementing input chunking, allowing the writer to continue functioning even if an error occurs during scanning. This vulnerability does not require authentication or user interaction to exploit, but the attacker must be able to supply a large single-line log entry, which may be feasible in applications that log user-controlled input. No known exploits have been reported in the wild as of the publication date. The vulnerability primarily impacts availability by causing denial-of-service conditions in applications relying on vulnerable logrus versions for logging.

Potential Impact

For European organizations, the primary impact of CVE-2025-65637 is application unavailability due to denial-of-service conditions triggered by malformed log entries. Organizations using Go applications that incorporate vulnerable versions of logrus for logging could experience service disruptions if attackers supply large single-line payloads to the logging interface. This could affect web services, APIs, or backend systems that rely on logrus for structured logging. The impact is particularly significant for critical infrastructure, financial services, and technology companies where uptime and reliability are paramount. Additionally, the inability to log further events may hinder incident response and forensic investigations during or after an attack. While the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can disrupt business operations and damage reputation. European organizations with automated logging pipelines or those exposing logging interfaces to external inputs are at higher risk. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2025-65637, European organizations should: 1) Upgrade all instances of logrus to versions 1.8.3, 1.9.1, 1.9.3, or later, where the vulnerability is fixed. 2) Audit application code to identify where Entry.Writer() is used and ensure that logging inputs are sanitized or limited in size, especially avoiding large single-line payloads without newline characters. 3) Implement input validation or rate limiting on user inputs that may be logged to prevent attackers from sending excessively large log entries. 4) Monitor application logs and error reports for signs of bufio.Scanner errors or unexpected writer closures that may indicate attempted exploitation. 5) Incorporate fallback logging mechanisms or alerting to detect and respond to logging failures promptly. 6) Educate developers about safe logging practices, emphasizing the risks of logging untrusted input without size or format constraints. 7) For critical systems, consider deploying runtime application self-protection (RASP) or Web Application Firewalls (WAFs) that can detect and block anomalous payloads targeting logging interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6931d56de9ea8245265c6745

Added to database: 12/4/2025, 6:39:41 PM

Last enriched: 12/4/2025, 6:39:57 PM

Last updated: 12/5/2025, 3:02:18 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats