CVE-2025-66909: n/a
Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompression bomb denial of service vulnerability. The ExtendedOpenCVImage class in ai/djl/opencv/ExtendedOpenCVImage.java loads images using OpenCV's imread() function without validating dimensions or pixel count before decompression. An attacker can upload a specially crafted compressed image file (e.g., PNG) that is small when compressed but expands to gigabytes of memory when loaded. This causes immediate memory exhaustion, OutOfMemoryError, and service crash. No authentication is required if the OCR service is publicly accessible. Multiple requests can completely deny service availability.
AI Analysis
Technical Summary
CVE-2025-66909 identifies a denial of service vulnerability in the Turms AI-Serving module version 0.10.0-SNAPSHOT and earlier. The root cause lies in the ExtendedOpenCVImage class within the ai/djl/opencv package, which loads images using OpenCV's imread() function without performing any validation on the image's dimensions or pixel count prior to decompression. This lack of validation allows an attacker to craft a compressed image file—such as a PNG—that is deceptively small in compressed form but expands massively when decompressed, consuming gigabytes of memory. When such an image is processed, the system experiences immediate memory exhaustion, leading to an OutOfMemoryError and crashing the AI-serving service. Since the OCR service component is often publicly accessible and does not require authentication, attackers can exploit this vulnerability remotely without credentials. Multiple requests with decompression bombs can completely deny service availability, resulting in a denial of service (DoS) condition. The vulnerability does not currently have a CVSS score or known exploits in the wild, but the impact on service availability is significant. The absence of input validation and resource constraints in image processing pipelines is a common security weakness that this vulnerability exemplifies. Organizations relying on Turms AI-Serving or similar AI image processing frameworks should be aware of this risk and implement mitigations promptly.
Potential Impact
For European organizations, the primary impact of CVE-2025-66909 is the potential for denial of service attacks against AI-serving infrastructures that process images, particularly OCR services exposed to the internet. Such attacks can disrupt critical business operations relying on automated image analysis, including document processing, identity verification, and automated workflows. The memory exhaustion caused by decompression bombs can lead to service outages, degraded performance, and increased operational costs due to recovery efforts. Organizations in sectors such as finance, healthcare, government, and legal services that utilize AI-driven image processing are especially vulnerable to operational disruption. Additionally, repeated service crashes may erode user trust and violate service level agreements (SLAs). Since no authentication is required to exploit the vulnerability if the service is public, attackers can launch these attacks at scale with minimal effort. The lack of known exploits in the wild suggests the vulnerability is newly disclosed, but the ease of exploitation and high impact on availability make it a critical concern for European entities deploying affected versions.
Mitigation Recommendations
To mitigate CVE-2025-66909, organizations should implement strict input validation on all image files before decompression, including checks on image dimensions, pixel count, and file size limits. Employ resource usage limits such as memory caps and timeouts during image processing to prevent excessive resource consumption. If possible, update or patch the Turms AI-Serving module to a version that addresses this vulnerability once available. Restrict public access to the OCR and image processing services by enforcing authentication and network access controls, such as IP whitelisting or VPN access. Deploy web application firewalls (WAFs) or API gateways that can detect and block suspicious image payloads or unusually large decompression requests. Monitor system logs and resource usage metrics for signs of abnormal memory consumption or repeated crashes. Consider sandboxing image processing components to isolate failures and prevent cascading service outages. Finally, maintain an incident response plan to quickly recover from potential denial of service events.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-66909: n/a
Description
Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompression bomb denial of service vulnerability. The ExtendedOpenCVImage class in ai/djl/opencv/ExtendedOpenCVImage.java loads images using OpenCV's imread() function without validating dimensions or pixel count before decompression. An attacker can upload a specially crafted compressed image file (e.g., PNG) that is small when compressed but expands to gigabytes of memory when loaded. This causes immediate memory exhaustion, OutOfMemoryError, and service crash. No authentication is required if the OCR service is publicly accessible. Multiple requests can completely deny service availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-66909 identifies a denial of service vulnerability in the Turms AI-Serving module version 0.10.0-SNAPSHOT and earlier. The root cause lies in the ExtendedOpenCVImage class within the ai/djl/opencv package, which loads images using OpenCV's imread() function without performing any validation on the image's dimensions or pixel count prior to decompression. This lack of validation allows an attacker to craft a compressed image file—such as a PNG—that is deceptively small in compressed form but expands massively when decompressed, consuming gigabytes of memory. When such an image is processed, the system experiences immediate memory exhaustion, leading to an OutOfMemoryError and crashing the AI-serving service. Since the OCR service component is often publicly accessible and does not require authentication, attackers can exploit this vulnerability remotely without credentials. Multiple requests with decompression bombs can completely deny service availability, resulting in a denial of service (DoS) condition. The vulnerability does not currently have a CVSS score or known exploits in the wild, but the impact on service availability is significant. The absence of input validation and resource constraints in image processing pipelines is a common security weakness that this vulnerability exemplifies. Organizations relying on Turms AI-Serving or similar AI image processing frameworks should be aware of this risk and implement mitigations promptly.
Potential Impact
For European organizations, the primary impact of CVE-2025-66909 is the potential for denial of service attacks against AI-serving infrastructures that process images, particularly OCR services exposed to the internet. Such attacks can disrupt critical business operations relying on automated image analysis, including document processing, identity verification, and automated workflows. The memory exhaustion caused by decompression bombs can lead to service outages, degraded performance, and increased operational costs due to recovery efforts. Organizations in sectors such as finance, healthcare, government, and legal services that utilize AI-driven image processing are especially vulnerable to operational disruption. Additionally, repeated service crashes may erode user trust and violate service level agreements (SLAs). Since no authentication is required to exploit the vulnerability if the service is public, attackers can launch these attacks at scale with minimal effort. The lack of known exploits in the wild suggests the vulnerability is newly disclosed, but the ease of exploitation and high impact on availability make it a critical concern for European entities deploying affected versions.
Mitigation Recommendations
To mitigate CVE-2025-66909, organizations should implement strict input validation on all image files before decompression, including checks on image dimensions, pixel count, and file size limits. Employ resource usage limits such as memory caps and timeouts during image processing to prevent excessive resource consumption. If possible, update or patch the Turms AI-Serving module to a version that addresses this vulnerability once available. Restrict public access to the OCR and image processing services by enforcing authentication and network access controls, such as IP whitelisting or VPN access. Deploy web application firewalls (WAFs) or API gateways that can detect and block suspicious image payloads or unusually large decompression requests. Monitor system logs and resource usage metrics for signs of abnormal memory consumption or repeated crashes. Consider sandboxing image processing components to isolate failures and prevent cascading service outages. Finally, maintain an incident response plan to quickly recover from potential denial of service events.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694563c4a90e3c9a153eb8fc
Added to database: 12/19/2025, 2:40:04 PM
Last enriched: 12/19/2025, 2:54:50 PM
Last updated: 12/20/2025, 9:08:48 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalCVE-2025-12820: CWE-862 Missing Authorization in Pure WC Variation Swatches
UnknownCVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.