CVE-2025-65637: n/a
A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.
AI Analysis
Technical Summary
CVE-2025-65637 is a denial-of-service vulnerability found in the logrus logging library, widely used in Go applications for structured logging. The issue arises in the Entry.Writer() function when it processes a single-line log payload exceeding 64KB without newline characters. Internally, logrus uses Go's bufio.Scanner to read input, which has a maximum token size limit. When this limit is exceeded, bufio.Scanner returns a "token too long" error, causing the writer pipe to close unexpectedly. This closure makes the Writer() unusable for subsequent logging operations, effectively causing a denial-of-service by preventing the application from logging further events and potentially leading to application unavailability. The vulnerability affects multiple versions of logrus prior to 1.8.3, 1.9.0, and 1.9.2. The developers addressed the issue in versions 1.8.3, 1.9.1, and 1.9.3 and later by chunking the input, allowing the writer to continue functioning even if an error occurs during scanning. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no required privileges or user interaction, and a direct impact on availability. No known exploits have been reported yet, but the vulnerability could be leveraged by attackers to disrupt services that rely on logrus for logging, especially those that accept untrusted input for logging purposes.
Potential Impact
The primary impact of CVE-2025-65637 is denial-of-service, leading to application unavailability. For European organizations, this can disrupt critical services that depend on Go applications using vulnerable logrus versions. Industries such as finance, healthcare, telecommunications, and public sector entities that rely on robust logging for auditing and monitoring could face operational interruptions. The inability to log events may also hinder incident response and forensic investigations during an attack. Since the vulnerability can be triggered remotely without authentication, exposed services that log user input or external data are at risk of being taken offline. This could result in service downtime, loss of customer trust, and potential regulatory compliance issues under frameworks like GDPR if service availability is impacted. Additionally, denial-of-service conditions can be leveraged as part of multi-stage attacks to distract or disable defenses.
Mitigation Recommendations
European organizations should immediately identify all applications and services using the logrus library, particularly versions prior to 1.8.3, 1.9.0, and 1.9.2. The primary mitigation is to upgrade to logrus versions 1.8.3, 1.9.1, 1.9.3, or later, where the vulnerability is fixed by chunking input to avoid scanner failures. If upgrading is not immediately feasible, organizations should implement input validation and sanitization to prevent logging of excessively large single-line payloads without newline characters. Rate limiting or filtering suspicious log inputs at the application or network level can reduce the risk of exploitation. Monitoring logs for unusual large entries and implementing alerting on logging failures can provide early detection of exploitation attempts. Additionally, segregating logging infrastructure and ensuring fallback logging mechanisms can help maintain availability during an attack. Security teams should also review application logging configurations to avoid logging untrusted or user-controlled data without proper controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Finland
CVE-2025-65637: n/a
Description
A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.
AI-Powered Analysis
Technical Analysis
CVE-2025-65637 is a denial-of-service vulnerability found in the logrus logging library, widely used in Go applications for structured logging. The issue arises in the Entry.Writer() function when it processes a single-line log payload exceeding 64KB without newline characters. Internally, logrus uses Go's bufio.Scanner to read input, which has a maximum token size limit. When this limit is exceeded, bufio.Scanner returns a "token too long" error, causing the writer pipe to close unexpectedly. This closure makes the Writer() unusable for subsequent logging operations, effectively causing a denial-of-service by preventing the application from logging further events and potentially leading to application unavailability. The vulnerability affects multiple versions of logrus prior to 1.8.3, 1.9.0, and 1.9.2. The developers addressed the issue in versions 1.8.3, 1.9.1, and 1.9.3 and later by chunking the input, allowing the writer to continue functioning even if an error occurs during scanning. The CVSS v3.1 base score is 7.5, reflecting high severity due to network attack vector, no required privileges or user interaction, and a direct impact on availability. No known exploits have been reported yet, but the vulnerability could be leveraged by attackers to disrupt services that rely on logrus for logging, especially those that accept untrusted input for logging purposes.
Potential Impact
The primary impact of CVE-2025-65637 is denial-of-service, leading to application unavailability. For European organizations, this can disrupt critical services that depend on Go applications using vulnerable logrus versions. Industries such as finance, healthcare, telecommunications, and public sector entities that rely on robust logging for auditing and monitoring could face operational interruptions. The inability to log events may also hinder incident response and forensic investigations during an attack. Since the vulnerability can be triggered remotely without authentication, exposed services that log user input or external data are at risk of being taken offline. This could result in service downtime, loss of customer trust, and potential regulatory compliance issues under frameworks like GDPR if service availability is impacted. Additionally, denial-of-service conditions can be leveraged as part of multi-stage attacks to distract or disable defenses.
Mitigation Recommendations
European organizations should immediately identify all applications and services using the logrus library, particularly versions prior to 1.8.3, 1.9.0, and 1.9.2. The primary mitigation is to upgrade to logrus versions 1.8.3, 1.9.1, 1.9.3, or later, where the vulnerability is fixed by chunking input to avoid scanner failures. If upgrading is not immediately feasible, organizations should implement input validation and sanitization to prevent logging of excessively large single-line payloads without newline characters. Rate limiting or filtering suspicious log inputs at the application or network level can reduce the risk of exploitation. Monitoring logs for unusual large entries and implementing alerting on logging failures can provide early detection of exploitation attempts. Additionally, segregating logging infrastructure and ensuring fallback logging mechanisms can help maintain availability during an attack. Security teams should also review application logging configurations to avoid logging untrusted or user-controlled data without proper controls.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6931d56de9ea8245265c6745
Added to database: 12/4/2025, 6:39:41 PM
Last enriched: 12/11/2025, 10:01:24 PM
Last updated: 1/18/2026, 1:42:39 PM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1120: SQL Injection in Yonyou KSOA
MediumCVE-2026-1119: SQL Injection in itsourcecode Society Management System
MediumCVE-2026-1118: SQL Injection in itsourcecode Society Management System
MediumCVE-2025-15537: Heap-based Buffer Overflow in Mapnik
MediumCVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.