CVE-2026-25962: CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) in MarkUsProject Markus
MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.4, MarkUs currently extracts zip files without any size or entry-count limits. For example, instructors can upload a zip file to provide an assignment configuration; students can upload a zip file for an assignment submission and indicate its contents should be extracted. This issue has been patched in version 2.9.4.
AI Analysis
Technical Summary
CVE-2026-25962 identifies a vulnerability in the Markus web application, a platform used for submission and grading of student assignments. Prior to version 2.9.4, Markus extracts uploaded zip files without imposing any limits on the size or number of entries within the archive. This improper handling of highly compressed data (classified under CWE-409: Improper Handling of Highly Compressed Data) allows an attacker with low-level privileges—such as an instructor uploading assignment configurations or a student submitting assignments—to upload specially crafted zip files that expand to consume excessive disk space or memory during extraction. This data amplification can overwhelm system resources, leading to denial of service (DoS) conditions that disrupt availability of the Markus service. The vulnerability does not impact confidentiality or integrity, as it does not allow unauthorized data access or modification. Exploitation requires authenticated access but no user interaction beyond the upload itself. The issue was publicly disclosed and patched in Markus version 2.9.4, which introduces limits on zip file extraction to prevent resource exhaustion. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 6.5, reflecting a medium severity level primarily due to the availability impact and ease of exploitation by authenticated users.
Potential Impact
The primary impact of CVE-2026-25962 is denial of service through resource exhaustion on servers running vulnerable Markus versions. Educational institutions relying on Markus for assignment submission and grading could experience service outages or degraded performance, disrupting academic workflows and potentially delaying grading processes. Since Markus is often deployed in university or school environments, the availability impact could affect large user bases including students and instructors. The vulnerability requires authenticated access, limiting exploitation to legitimate users, but this does not eliminate risk as students or instructors can be malicious or compromised. There is no direct impact on confidentiality or data integrity, so data breaches or unauthorized data manipulation are not concerns here. However, prolonged downtime or repeated DoS attacks could undermine trust in the platform and force costly incident response or system recovery efforts. Organizations with automated grading pipelines or integrations dependent on Markus may face cascading operational impacts. The absence of known exploits in the wild reduces immediate risk but does not preclude future attacks, especially as the vulnerability is publicly known and patched.
Mitigation Recommendations
The primary mitigation is to upgrade Markus installations to version 2.9.4 or later, where the vulnerability is patched by imposing limits on zip file extraction size and entry count. Until upgrades can be applied, organizations should implement strict input validation and file size limits on uploaded zip files at the web application firewall or reverse proxy level. Monitoring and alerting on unusually large or numerous file extraction operations can help detect exploitation attempts. Role-based access controls should be reviewed to ensure only trusted users can upload zip files for extraction. Rate limiting uploads and isolating the extraction process in sandboxed environments with resource quotas can reduce the impact of potential attacks. Additionally, administrators should audit logs for suspicious upload patterns and educate users about the risks of uploading untrusted archives. Regular backups and incident response plans should be updated to handle potential service disruptions. Finally, security teams should stay informed about Markus updates and vulnerability disclosures to respond promptly to emerging threats.
Affected Countries
United States, Canada, United Kingdom, Germany, Australia, Netherlands, France, India, Japan, South Korea
CVE-2026-25962: CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) in MarkUsProject Markus
Description
MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.4, MarkUs currently extracts zip files without any size or entry-count limits. For example, instructors can upload a zip file to provide an assignment configuration; students can upload a zip file for an assignment submission and indicate its contents should be extracted. This issue has been patched in version 2.9.4.
AI-Powered Analysis
Technical Analysis
CVE-2026-25962 identifies a vulnerability in the Markus web application, a platform used for submission and grading of student assignments. Prior to version 2.9.4, Markus extracts uploaded zip files without imposing any limits on the size or number of entries within the archive. This improper handling of highly compressed data (classified under CWE-409: Improper Handling of Highly Compressed Data) allows an attacker with low-level privileges—such as an instructor uploading assignment configurations or a student submitting assignments—to upload specially crafted zip files that expand to consume excessive disk space or memory during extraction. This data amplification can overwhelm system resources, leading to denial of service (DoS) conditions that disrupt availability of the Markus service. The vulnerability does not impact confidentiality or integrity, as it does not allow unauthorized data access or modification. Exploitation requires authenticated access but no user interaction beyond the upload itself. The issue was publicly disclosed and patched in Markus version 2.9.4, which introduces limits on zip file extraction to prevent resource exhaustion. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 6.5, reflecting a medium severity level primarily due to the availability impact and ease of exploitation by authenticated users.
Potential Impact
The primary impact of CVE-2026-25962 is denial of service through resource exhaustion on servers running vulnerable Markus versions. Educational institutions relying on Markus for assignment submission and grading could experience service outages or degraded performance, disrupting academic workflows and potentially delaying grading processes. Since Markus is often deployed in university or school environments, the availability impact could affect large user bases including students and instructors. The vulnerability requires authenticated access, limiting exploitation to legitimate users, but this does not eliminate risk as students or instructors can be malicious or compromised. There is no direct impact on confidentiality or data integrity, so data breaches or unauthorized data manipulation are not concerns here. However, prolonged downtime or repeated DoS attacks could undermine trust in the platform and force costly incident response or system recovery efforts. Organizations with automated grading pipelines or integrations dependent on Markus may face cascading operational impacts. The absence of known exploits in the wild reduces immediate risk but does not preclude future attacks, especially as the vulnerability is publicly known and patched.
Mitigation Recommendations
The primary mitigation is to upgrade Markus installations to version 2.9.4 or later, where the vulnerability is patched by imposing limits on zip file extraction size and entry count. Until upgrades can be applied, organizations should implement strict input validation and file size limits on uploaded zip files at the web application firewall or reverse proxy level. Monitoring and alerting on unusually large or numerous file extraction operations can help detect exploitation attempts. Role-based access controls should be reviewed to ensure only trusted users can upload zip files for extraction. Rate limiting uploads and isolating the extraction process in sandboxed environments with resource quotas can reduce the impact of potential attacks. Additionally, administrators should audit logs for suspicious upload patterns and educate users about the risks of uploading untrusted archives. Regular backups and incident response plans should be updated to handle potential service disruptions. Finally, security teams should stay informed about Markus updates and vulnerability disclosures to respond promptly to emerging threats.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-09T17:13:54.066Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69aa4a7bc48b3f10ffe32f6d
Added to database: 3/6/2026, 3:31:07 AM
Last enriched: 3/6/2026, 3:46:53 AM
Last updated: 3/7/2026, 3:56:08 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.