CVE-2026-27695: CWE-770: Allocation of Resources Without Limits or Throttling in zeroae zae-limiter
CVE-2026-27695 is a medium severity vulnerability in the zeroae zae-limiter library versions prior to 0. 10. 1. The library uses a token bucket algorithm for rate limiting, but all rate limit buckets for a single entity share the same DynamoDB partition key. This design can cause a high-traffic entity to exceed DynamoDB's per-partition throughput limits, leading to throttling and degraded service availability for that entity and potentially others sharing the partition. The vulnerability does not impact confidentiality or integrity but affects availability due to resource exhaustion. Exploitation requires network access and low privileges but no user interaction. The issue is fixed in version 0. 10. 1 by changing the partition key scheme to avoid shared throughput limits.
AI Analysis
Technical Summary
The vulnerability CVE-2026-27695 affects the zeroae zae-limiter library, a rate limiting tool that implements the token bucket algorithm to control request rates. Prior to version 0.10.1, the library stored all rate limit buckets for a single entity under the same DynamoDB partition key formatted as `namespace/ENTITY#{id}`. DynamoDB enforces throughput limits on a per-partition basis, typically around 1,000 write capacity units (WCU) per second. When a high-traffic entity generates enough requests, it can exceed these throughput limits, causing DynamoDB to throttle requests. This throttling results in degraded availability of the rate limiting service for that entity and potentially other entities sharing the same partition key. The root cause is the lack of resource allocation limits or throttling within the library's partition key design, which violates CWE-770 (Allocation of Resources Without Limits or Throttling). The vulnerability does not expose sensitive data or allow unauthorized modifications but impacts service availability. The fix introduced in version 0.10.1 changes the partition key scheme to distribute rate limit buckets more evenly across partitions, preventing a single entity from overwhelming a partition's throughput. No known exploits are reported in the wild, but the vulnerability poses a risk to systems relying on zae-limiter for rate limiting in high-traffic scenarios.
Potential Impact
The primary impact of this vulnerability is on the availability of services using the zae-limiter library for rate limiting. Organizations with high-traffic entities risk experiencing throttling from DynamoDB, which can degrade or disrupt service responsiveness. This can lead to denial of service conditions for affected entities and potentially others sharing the same DynamoDB partition, causing cascading service degradation. While confidentiality and integrity remain unaffected, the availability impact can affect user experience, operational continuity, and potentially lead to financial or reputational damage. Systems that rely heavily on zae-limiter for controlling API or service request rates are particularly vulnerable. The vulnerability could be exploited unintentionally by legitimate high traffic or intentionally by an attacker generating excessive requests to trigger throttling. The scope includes any deployment of zae-limiter versions prior to 0.10.1 using AWS DynamoDB as the backend. Given the medium CVSS score (4.3), the threat is moderate but significant in environments with high request volumes.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all instances of the zeroae zae-limiter library to version 0.10.1 or later, where the partition key scheme has been revised to prevent throughput bottlenecks. Additionally, review and redesign rate limiting configurations to ensure that high-traffic entities do not share DynamoDB partitions excessively. Implement monitoring on DynamoDB partition throttling metrics (such as ConsumedWriteCapacityUnits and ThrottledRequests) to detect early signs of resource exhaustion. Consider applying adaptive rate limiting or request shaping upstream to prevent sudden spikes in traffic. If upgrading immediately is not feasible, temporarily isolate high-traffic entities into separate namespaces or partitions to reduce shared throughput contention. Finally, conduct load testing to validate that the rate limiting infrastructure can handle expected traffic volumes without triggering throttling.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Singapore
CVE-2026-27695: CWE-770: Allocation of Resources Without Limits or Throttling in zeroae zae-limiter
Description
CVE-2026-27695 is a medium severity vulnerability in the zeroae zae-limiter library versions prior to 0. 10. 1. The library uses a token bucket algorithm for rate limiting, but all rate limit buckets for a single entity share the same DynamoDB partition key. This design can cause a high-traffic entity to exceed DynamoDB's per-partition throughput limits, leading to throttling and degraded service availability for that entity and potentially others sharing the partition. The vulnerability does not impact confidentiality or integrity but affects availability due to resource exhaustion. Exploitation requires network access and low privileges but no user interaction. The issue is fixed in version 0. 10. 1 by changing the partition key scheme to avoid shared throughput limits.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-27695 affects the zeroae zae-limiter library, a rate limiting tool that implements the token bucket algorithm to control request rates. Prior to version 0.10.1, the library stored all rate limit buckets for a single entity under the same DynamoDB partition key formatted as `namespace/ENTITY#{id}`. DynamoDB enforces throughput limits on a per-partition basis, typically around 1,000 write capacity units (WCU) per second. When a high-traffic entity generates enough requests, it can exceed these throughput limits, causing DynamoDB to throttle requests. This throttling results in degraded availability of the rate limiting service for that entity and potentially other entities sharing the same partition key. The root cause is the lack of resource allocation limits or throttling within the library's partition key design, which violates CWE-770 (Allocation of Resources Without Limits or Throttling). The vulnerability does not expose sensitive data or allow unauthorized modifications but impacts service availability. The fix introduced in version 0.10.1 changes the partition key scheme to distribute rate limit buckets more evenly across partitions, preventing a single entity from overwhelming a partition's throughput. No known exploits are reported in the wild, but the vulnerability poses a risk to systems relying on zae-limiter for rate limiting in high-traffic scenarios.
Potential Impact
The primary impact of this vulnerability is on the availability of services using the zae-limiter library for rate limiting. Organizations with high-traffic entities risk experiencing throttling from DynamoDB, which can degrade or disrupt service responsiveness. This can lead to denial of service conditions for affected entities and potentially others sharing the same DynamoDB partition, causing cascading service degradation. While confidentiality and integrity remain unaffected, the availability impact can affect user experience, operational continuity, and potentially lead to financial or reputational damage. Systems that rely heavily on zae-limiter for controlling API or service request rates are particularly vulnerable. The vulnerability could be exploited unintentionally by legitimate high traffic or intentionally by an attacker generating excessive requests to trigger throttling. The scope includes any deployment of zae-limiter versions prior to 0.10.1 using AWS DynamoDB as the backend. Given the medium CVSS score (4.3), the threat is moderate but significant in environments with high request volumes.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all instances of the zeroae zae-limiter library to version 0.10.1 or later, where the partition key scheme has been revised to prevent throughput bottlenecks. Additionally, review and redesign rate limiting configurations to ensure that high-traffic entities do not share DynamoDB partitions excessively. Implement monitoring on DynamoDB partition throttling metrics (such as ConsumedWriteCapacityUnits and ThrottledRequests) to detect early signs of resource exhaustion. Consider applying adaptive rate limiting or request shaping upstream to prevent sudden spikes in traffic. If upgrading immediately is not feasible, temporarily isolate high-traffic entities into separate namespaces or partitions to reduce shared throughput contention. Finally, conduct load testing to validate that the rate limiting infrastructure can handle expected traffic volumes without triggering throttling.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T17:56:51.202Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f1123b7ef31ef0b2a7c58
Added to database: 2/25/2026, 3:11:31 PM
Last enriched: 2/25/2026, 3:26:31 PM
Last updated: 2/25/2026, 8:09:05 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Google Disrupts Chinese Cyberespionage Campaign Targeting Telecoms, Governments
MediumCVE-2026-3206: CWE-404 Improper Resource Shutdown or Release in KrakenD KrakenD-CE
LowCVE-2026-27848: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Linksys MR9600
CriticalCVE-2026-27847: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Linksys MR9600
HighCVE-2026-27846: CWE-306 Missing Authentication for Critical Function in Linksys MR9600
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.