CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
CVE-2026-25762 is a high-severity denial of service vulnerability in the AdonisJS web framework's multipart file handling logic. The issue arises from uncontrolled resource consumption when processing file uploads, where the multipart parser accumulates unbounded data in memory attempting to detect file types. This can lead to excessive memory usage and process termination, causing service disruption. The vulnerability affects AdonisJS versions prior to 10. 1. 3 and 11. 0. 0-next. 9 and requires no authentication or user interaction to exploit. Although no known exploits are currently reported in the wild, unpatched systems remain at risk.
AI Analysis
Technical Summary
CVE-2026-25762 is a denial of service (DoS) vulnerability identified in the core of AdonisJS, a popular TypeScript-first web framework. The flaw exists in the multipart file handling component of the @adonisjs/bodyparser package, which is responsible for processing file uploads. Specifically, when the multipart parser attempts to detect file types during upload processing, it may accumulate an unbounded amount of data in memory. This uncontrolled resource consumption can cause excessive memory usage, leading to process termination and denial of service. The vulnerability affects all AdonisJS versions prior to 10.1.3 and 11.0.0-next.9, where the issue has been patched. Exploitation requires no authentication or user interaction and can be triggered remotely by sending specially crafted multipart file uploads. The CVSS v3.1 score of 7.5 reflects a high severity, primarily due to the impact on availability (A:H) with no impact on confidentiality or integrity. No known exploits are currently reported in the wild, but the vulnerability presents a significant risk to any web application relying on vulnerable AdonisJS versions for file upload handling. The root cause relates to CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling), highlighting a failure to impose limits on memory usage during file type detection. This flaw can be exploited to exhaust server memory resources, causing application crashes and service outages.
Potential Impact
For European organizations, the primary impact of CVE-2026-25762 is the potential for denial of service attacks against web applications built on vulnerable versions of AdonisJS. Such attacks can disrupt business operations by causing application downtime, degrading user experience, and potentially leading to loss of customer trust. Organizations in sectors relying heavily on web services—such as e-commerce, finance, healthcare, and public services—may face operational interruptions. The vulnerability could be exploited by remote attackers without authentication, increasing the risk of widespread attacks. Additionally, the resource exhaustion could be leveraged as part of a larger multi-vector attack, amplifying its impact. Given the growing adoption of Node.js frameworks like AdonisJS in Europe, especially among startups and digital service providers, the threat surface is significant. The lack of known exploits in the wild suggests a window of opportunity for defenders to patch systems before active exploitation occurs. However, failure to address this vulnerability promptly could lead to service outages and associated financial and reputational damage.
Mitigation Recommendations
To mitigate CVE-2026-25762, European organizations should: 1) Immediately upgrade all AdonisJS instances to version 10.1.3 or later, or 11.0.0-next.9 or later, where the vulnerability is patched. 2) Implement strict limits on file upload sizes and the number of concurrent uploads to reduce the risk of resource exhaustion. 3) Employ application-layer firewalls or web application firewalls (WAFs) configured to detect and block anomalous multipart upload patterns that may indicate exploitation attempts. 4) Monitor application memory usage and set alerts for unusual spikes that could indicate an ongoing attack. 5) Conduct regular code and dependency audits to identify and remediate vulnerable components promptly. 6) Consider isolating file upload handling in separate processes or containers with resource limits to contain potential DoS impacts. 7) Educate development teams on secure file handling practices and the importance of timely patching. These measures, combined with proactive monitoring, will reduce the risk and impact of exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland, Belgium
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
Description
CVE-2026-25762 is a high-severity denial of service vulnerability in the AdonisJS web framework's multipart file handling logic. The issue arises from uncontrolled resource consumption when processing file uploads, where the multipart parser accumulates unbounded data in memory attempting to detect file types. This can lead to excessive memory usage and process termination, causing service disruption. The vulnerability affects AdonisJS versions prior to 10. 1. 3 and 11. 0. 0-next. 9 and requires no authentication or user interaction to exploit. Although no known exploits are currently reported in the wild, unpatched systems remain at risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-25762 is a denial of service (DoS) vulnerability identified in the core of AdonisJS, a popular TypeScript-first web framework. The flaw exists in the multipart file handling component of the @adonisjs/bodyparser package, which is responsible for processing file uploads. Specifically, when the multipart parser attempts to detect file types during upload processing, it may accumulate an unbounded amount of data in memory. This uncontrolled resource consumption can cause excessive memory usage, leading to process termination and denial of service. The vulnerability affects all AdonisJS versions prior to 10.1.3 and 11.0.0-next.9, where the issue has been patched. Exploitation requires no authentication or user interaction and can be triggered remotely by sending specially crafted multipart file uploads. The CVSS v3.1 score of 7.5 reflects a high severity, primarily due to the impact on availability (A:H) with no impact on confidentiality or integrity. No known exploits are currently reported in the wild, but the vulnerability presents a significant risk to any web application relying on vulnerable AdonisJS versions for file upload handling. The root cause relates to CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling), highlighting a failure to impose limits on memory usage during file type detection. This flaw can be exploited to exhaust server memory resources, causing application crashes and service outages.
Potential Impact
For European organizations, the primary impact of CVE-2026-25762 is the potential for denial of service attacks against web applications built on vulnerable versions of AdonisJS. Such attacks can disrupt business operations by causing application downtime, degrading user experience, and potentially leading to loss of customer trust. Organizations in sectors relying heavily on web services—such as e-commerce, finance, healthcare, and public services—may face operational interruptions. The vulnerability could be exploited by remote attackers without authentication, increasing the risk of widespread attacks. Additionally, the resource exhaustion could be leveraged as part of a larger multi-vector attack, amplifying its impact. Given the growing adoption of Node.js frameworks like AdonisJS in Europe, especially among startups and digital service providers, the threat surface is significant. The lack of known exploits in the wild suggests a window of opportunity for defenders to patch systems before active exploitation occurs. However, failure to address this vulnerability promptly could lead to service outages and associated financial and reputational damage.
Mitigation Recommendations
To mitigate CVE-2026-25762, European organizations should: 1) Immediately upgrade all AdonisJS instances to version 10.1.3 or later, or 11.0.0-next.9 or later, where the vulnerability is patched. 2) Implement strict limits on file upload sizes and the number of concurrent uploads to reduce the risk of resource exhaustion. 3) Employ application-layer firewalls or web application firewalls (WAFs) configured to detect and block anomalous multipart upload patterns that may indicate exploitation attempts. 4) Monitor application memory usage and set alerts for unusual spikes that could indicate an ongoing attack. 5) Conduct regular code and dependency audits to identify and remediate vulnerable components promptly. 6) Consider isolating file upload handling in separate processes or containers with resource limits to contain potential DoS impacts. 7) Educate development teams on secure file handling practices and the importance of timely patching. These measures, combined with proactive monitoring, will reduce the risk and impact of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T18:35:52.358Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69867278f9fa50a62f39d4ff
Added to database: 2/6/2026, 11:00:08 PM
Last enriched: 2/6/2026, 11:14:32 PM
Last updated: 2/7/2026, 12:07:40 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalCVE-2026-25793: CWE-347: Improper Verification of Cryptographic Signature in slackhq nebula
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.