Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27695: CWE-770: Allocation of Resources Without Limits or Throttling in zeroae zae-limiter

0
Medium
VulnerabilityCVE-2026-27695cvecve-2026-27695cwe-770
Published: Wed Feb 25 2026 (02/25/2026, 14:56:27 UTC)
Source: CVE Database V5
Vendor/Project: zeroae
Product: zae-limiter

Description

CVE-2026-27695 is a medium severity vulnerability in the zeroae zae-limiter library versions prior to 0. 10. 1. The library uses a token bucket algorithm for rate limiting, but all rate limit buckets for a single entity share the same DynamoDB partition key. This design can cause a high-traffic entity to exceed DynamoDB's per-partition throughput limits, leading to throttling and degraded service availability for that entity and potentially others sharing the partition. The vulnerability does not impact confidentiality or integrity but affects availability due to resource exhaustion. Exploitation requires network access and low privileges but no user interaction. The issue is fixed in version 0. 10. 1 by changing the partition key scheme to avoid shared throughput limits.

AI-Powered Analysis

AILast updated: 02/25/2026, 15:26:31 UTC

Technical Analysis

The vulnerability CVE-2026-27695 affects the zeroae zae-limiter library, a rate limiting tool that implements the token bucket algorithm to control request rates. Prior to version 0.10.1, the library stored all rate limit buckets for a single entity under the same DynamoDB partition key formatted as `namespace/ENTITY#{id}`. DynamoDB enforces throughput limits on a per-partition basis, typically around 1,000 write capacity units (WCU) per second. When a high-traffic entity generates enough requests, it can exceed these throughput limits, causing DynamoDB to throttle requests. This throttling results in degraded availability of the rate limiting service for that entity and potentially other entities sharing the same partition key. The root cause is the lack of resource allocation limits or throttling within the library's partition key design, which violates CWE-770 (Allocation of Resources Without Limits or Throttling). The vulnerability does not expose sensitive data or allow unauthorized modifications but impacts service availability. The fix introduced in version 0.10.1 changes the partition key scheme to distribute rate limit buckets more evenly across partitions, preventing a single entity from overwhelming a partition's throughput. No known exploits are reported in the wild, but the vulnerability poses a risk to systems relying on zae-limiter for rate limiting in high-traffic scenarios.

Potential Impact

The primary impact of this vulnerability is on the availability of services using the zae-limiter library for rate limiting. Organizations with high-traffic entities risk experiencing throttling from DynamoDB, which can degrade or disrupt service responsiveness. This can lead to denial of service conditions for affected entities and potentially others sharing the same DynamoDB partition, causing cascading service degradation. While confidentiality and integrity remain unaffected, the availability impact can affect user experience, operational continuity, and potentially lead to financial or reputational damage. Systems that rely heavily on zae-limiter for controlling API or service request rates are particularly vulnerable. The vulnerability could be exploited unintentionally by legitimate high traffic or intentionally by an attacker generating excessive requests to trigger throttling. The scope includes any deployment of zae-limiter versions prior to 0.10.1 using AWS DynamoDB as the backend. Given the medium CVSS score (4.3), the threat is moderate but significant in environments with high request volumes.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade all instances of the zeroae zae-limiter library to version 0.10.1 or later, where the partition key scheme has been revised to prevent throughput bottlenecks. Additionally, review and redesign rate limiting configurations to ensure that high-traffic entities do not share DynamoDB partitions excessively. Implement monitoring on DynamoDB partition throttling metrics (such as ConsumedWriteCapacityUnits and ThrottledRequests) to detect early signs of resource exhaustion. Consider applying adaptive rate limiting or request shaping upstream to prevent sudden spikes in traffic. If upgrading immediately is not feasible, temporarily isolate high-traffic entities into separate namespaces or partitions to reduce shared throughput contention. Finally, conduct load testing to validate that the rate limiting infrastructure can handle expected traffic volumes without triggering throttling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-23T17:56:51.202Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f1123b7ef31ef0b2a7c58

Added to database: 2/25/2026, 3:11:31 PM

Last enriched: 2/25/2026, 3:26:31 PM

Last updated: 2/25/2026, 8:09:05 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats