Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67725: CWE-400: Uncontrolled Resource Consumption in tornadoweb tornado

0
High
VulnerabilityCVE-2025-67725cvecve-2025-67725cwe-400
Published: Fri Dec 12 2025 (12/12/2025, 05:49:41 UTC)
Source: CVE Database V5
Vendor/Project: tornadoweb
Product: tornado

Description

Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, a single maliciously crafted HTTP request can block the server's event loop for an extended period, caused by the HTTPHeaders.add method. The function accumulates values using string concatenation when the same header name is repeated, causing a Denial of Service (DoS). Due to Python string immutability, each concatenation copies the entire string, resulting in O(n²) time complexity. The severity can vary from high if max_header_size has been increased from its default, to low if it has its default value of 64KB. This issue is fixed in version 6.5.3.

AI-Powered Analysis

AILast updated: 12/19/2025, 07:49:27 UTC

Technical Analysis

CVE-2025-67725 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Tornado, a popular Python web framework and asynchronous networking library. Versions 6.5.2 and earlier contain a flaw in the HTTPHeaders.add method, which handles HTTP request headers. When a malicious actor sends an HTTP request with repeated header names, the method concatenates header values using Python string concatenation. Due to Python strings being immutable, each concatenation operation creates a new string copy, resulting in quadratic time complexity (O(n²)) relative to the number of repeated headers. This inefficiency can cause the Tornado server's event loop to become blocked for an extended period, effectively causing a Denial of Service (DoS). The severity of the impact depends on the max_header_size setting: if it remains at the default 64KB, the impact is lower; if increased, the potential for resource exhaustion and service disruption is higher. The vulnerability requires no privileges or user interaction to exploit, making it accessible to remote unauthenticated attackers. No known exploits are reported in the wild as of publication. The issue is resolved in Tornado version 6.5.3, which optimizes header value handling to prevent excessive resource consumption.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of web applications and services built on Tornado versions prior to 6.5.3. Organizations relying on Tornado for asynchronous networking or web server functionality could experience service outages or degraded performance if targeted by attackers sending crafted HTTP requests with repeated headers. This could disrupt business operations, customer-facing services, and internal applications, potentially leading to financial losses and reputational damage. The risk is amplified in environments where max_header_size is configured above the default, increasing the attack surface. Critical infrastructure, financial services, and public sector organizations using Tornado-based applications are particularly vulnerable to DoS attacks exploiting this flaw. Although no known exploits are currently active, the ease of exploitation and lack of required authentication make proactive mitigation essential.

Mitigation Recommendations

1. Upgrade all Tornado deployments to version 6.5.3 or later immediately to apply the fix addressing this vulnerability. 2. Review and, if possible, revert any increases to the max_header_size configuration to the default 64KB to limit potential resource exhaustion. 3. Implement web application firewalls (WAFs) or reverse proxies capable of detecting and blocking HTTP requests with suspiciously repeated headers or abnormal header sizes. 4. Monitor server logs and network traffic for unusual patterns of repeated HTTP headers or spikes in request processing times indicative of attempted exploitation. 5. Employ rate limiting on incoming HTTP requests to reduce the impact of potential DoS attempts. 6. Conduct regular security audits and vulnerability scans focusing on dependencies such as Tornado to ensure timely patching. 7. Educate development and operations teams about the risks of uncontrolled resource consumption vulnerabilities and best practices for secure configuration.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-10T19:25:20.819Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693badd05785fd87b5f80b8a

Added to database: 12/12/2025, 5:53:20 AM

Last enriched: 12/19/2025, 7:49:27 AM

Last updated: 2/7/2026, 8:47:35 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats