CVE-2025-65887: n/a
CVE-2025-65887 is a medium-severity vulnerability in OneFlow v0. 9. 0 where a division-by-zero error in the flow. floor_divide() function can be triggered by a crafted input tensor containing zero. This flaw allows unauthenticated attackers to cause a Denial of Service (DoS) by crashing or halting the application using OneFlow. The vulnerability does not impact confidentiality or integrity but affects availability. Exploitation requires user interaction to supply the malicious input tensor. No known exploits are currently reported in the wild. European organizations using OneFlow for machine learning workloads may experience service disruptions if targeted. Mitigation involves input validation and patching once updates are available.
AI Analysis
Technical Summary
CVE-2025-65887 identifies a division-by-zero vulnerability in the flow.floor_divide() component of OneFlow version 0.9.0, a machine learning framework. The flaw arises when the function attempts to perform floor division on an input tensor that contains zero, leading to an unhandled division-by-zero exception. This causes the application to crash or become unresponsive, resulting in a Denial of Service (DoS) condition. The vulnerability can be triggered remotely without requiring privileges, but it does require user interaction to supply the crafted input tensor. The CVSS score of 6.5 reflects a medium severity, emphasizing the impact on availability without compromising confidentiality or integrity. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability primarily affects systems running OneFlow v0.9.0, which is used in AI and machine learning workflows. Attackers could exploit this flaw to disrupt services, degrade system reliability, or cause downtime in environments relying on OneFlow for critical processing tasks.
Potential Impact
For European organizations, the primary impact is service disruption due to Denial of Service attacks targeting OneFlow-based applications. This can affect AI research labs, data science teams, and enterprises leveraging OneFlow for machine learning model training and inference. Disruptions could delay project timelines, reduce productivity, and potentially cause financial losses if critical systems become unavailable. Since the vulnerability does not affect data confidentiality or integrity, the risk of data breaches is low. However, availability issues can impact sectors relying on real-time or high-availability AI services, such as healthcare, finance, and manufacturing. Organizations with automated pipelines or cloud-based AI services using OneFlow may experience cascading failures if the vulnerability is exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation to ensure that tensors passed to flow.floor_divide() do not contain zero values that could trigger division-by-zero errors. Developers should add exception handling around floor division operations to gracefully manage unexpected inputs. Monitoring and logging should be enhanced to detect abnormal crashes or service interruptions related to OneFlow processes. Organizations should stay alert for official patches or updates from the OneFlow development team and apply them promptly once available. In the interim, restricting access to systems running OneFlow and limiting exposure to untrusted inputs can reduce exploitation risk. Additionally, sandboxing or containerizing OneFlow workloads can help contain potential DoS impacts. Regular backups and failover mechanisms should be tested to maintain service continuity.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-65887: n/a
Description
CVE-2025-65887 is a medium-severity vulnerability in OneFlow v0. 9. 0 where a division-by-zero error in the flow. floor_divide() function can be triggered by a crafted input tensor containing zero. This flaw allows unauthenticated attackers to cause a Denial of Service (DoS) by crashing or halting the application using OneFlow. The vulnerability does not impact confidentiality or integrity but affects availability. Exploitation requires user interaction to supply the malicious input tensor. No known exploits are currently reported in the wild. European organizations using OneFlow for machine learning workloads may experience service disruptions if targeted. Mitigation involves input validation and patching once updates are available.
AI-Powered Analysis
Technical Analysis
CVE-2025-65887 identifies a division-by-zero vulnerability in the flow.floor_divide() component of OneFlow version 0.9.0, a machine learning framework. The flaw arises when the function attempts to perform floor division on an input tensor that contains zero, leading to an unhandled division-by-zero exception. This causes the application to crash or become unresponsive, resulting in a Denial of Service (DoS) condition. The vulnerability can be triggered remotely without requiring privileges, but it does require user interaction to supply the crafted input tensor. The CVSS score of 6.5 reflects a medium severity, emphasizing the impact on availability without compromising confidentiality or integrity. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability primarily affects systems running OneFlow v0.9.0, which is used in AI and machine learning workflows. Attackers could exploit this flaw to disrupt services, degrade system reliability, or cause downtime in environments relying on OneFlow for critical processing tasks.
Potential Impact
For European organizations, the primary impact is service disruption due to Denial of Service attacks targeting OneFlow-based applications. This can affect AI research labs, data science teams, and enterprises leveraging OneFlow for machine learning model training and inference. Disruptions could delay project timelines, reduce productivity, and potentially cause financial losses if critical systems become unavailable. Since the vulnerability does not affect data confidentiality or integrity, the risk of data breaches is low. However, availability issues can impact sectors relying on real-time or high-availability AI services, such as healthcare, finance, and manufacturing. Organizations with automated pipelines or cloud-based AI services using OneFlow may experience cascading failures if the vulnerability is exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict input validation to ensure that tensors passed to flow.floor_divide() do not contain zero values that could trigger division-by-zero errors. Developers should add exception handling around floor division operations to gracefully manage unexpected inputs. Monitoring and logging should be enhanced to detect abnormal crashes or service interruptions related to OneFlow processes. Organizations should stay alert for official patches or updates from the OneFlow development team and apply them promptly once available. In the interim, restricting access to systems running OneFlow and limiting exposure to untrusted inputs can reduce exploitation risk. Additionally, sandboxing or containerizing OneFlow workloads can help contain potential DoS impacts. Regular backups and failover mechanisms should be tested to maintain service continuity.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697a3aee4623b1157cd881c1
Added to database: 1/28/2026, 4:35:58 PM
Last enriched: 2/5/2026, 9:04:08 AM
Last updated: 2/7/2026, 8:35:57 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2078: Improper Authorization in yeqifu warehouse
MediumCVE-2026-25533: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in agentfront enclave
MediumCVE-2026-25123: CWE-918: Server-Side Request Forgery (SSRF) in homarr-labs homarr
MediumCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighCVE-2026-2074: XML External Entity Reference in O2OA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.