Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65637: n/a

0
High
VulnerabilityCVE-2025-65637cvecve-2025-65637
Published: Thu Dec 04 2025 (12/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.

AI-Powered Analysis

AILast updated: 12/11/2025, 22:01:24 UTC

Technical Analysis

CVE-2025-65637 is a denial-of-service vulnerability found in the logrus logging library, widely used in Go applications for structured logging. The issue arises in the Entry.Writer() function when it processes a single-line log payload exceeding 64KB without newline characters. Internally, logrus uses Go's bufio.Scanner to read input, which has a maximum token size limit. When this limit is exceeded, bufio.Scanner returns a "token too long" error, causing the writer pipe to close unexpectedly. This closure makes the Writer() unusable for subsequent logging operations, effectively causing a denial-of-service by preventing the application from logging further events and potentially leading to application unavailability. The vulnerability affects multiple versions of logrus prior to 1.8.3, 1.9.0, and 1.9.2. The developers addressed the issue in versions 1.8.3, 1.9.1, and 1.9.3 and later by chunking the input, allowing the writer to continue functioning even if an error occurs during scanning. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no required privileges or user interaction, and a direct impact on availability. No known exploits have been reported yet, but the vulnerability could be leveraged by attackers to disrupt services that rely on logrus for logging, especially those that accept untrusted input for logging purposes.

Potential Impact

The primary impact of CVE-2025-65637 is denial-of-service, leading to application unavailability. For European organizations, this can disrupt critical services that depend on Go applications using vulnerable logrus versions. Industries such as finance, healthcare, telecommunications, and public sector entities that rely on robust logging for auditing and monitoring could face operational interruptions. The inability to log events may also hinder incident response and forensic investigations during an attack. Since the vulnerability can be triggered remotely without authentication, exposed services that log user input or external data are at risk of being taken offline. This could result in service downtime, loss of customer trust, and potential regulatory compliance issues under frameworks like GDPR if service availability is impacted. Additionally, denial-of-service conditions can be leveraged as part of multi-stage attacks to distract or disable defenses.

Mitigation Recommendations

European organizations should immediately identify all applications and services using the logrus library, particularly versions prior to 1.8.3, 1.9.0, and 1.9.2. The primary mitigation is to upgrade to logrus versions 1.8.3, 1.9.1, 1.9.3, or later, where the vulnerability is fixed by chunking input to avoid scanner failures. If upgrading is not immediately feasible, organizations should implement input validation and sanitization to prevent logging of excessively large single-line payloads without newline characters. Rate limiting or filtering suspicious log inputs at the application or network level can reduce the risk of exploitation. Monitoring logs for unusual large entries and implementing alerting on logging failures can provide early detection of exploitation attempts. Additionally, segregating logging infrastructure and ensuring fallback logging mechanisms can help maintain availability during an attack. Security teams should also review application logging configurations to avoid logging untrusted or user-controlled data without proper controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6931d56de9ea8245265c6745

Added to database: 12/4/2025, 6:39:41 PM

Last enriched: 12/11/2025, 10:01:24 PM

Last updated: 1/18/2026, 1:42:39 PM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats