Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27887: CWE-770: Allocation of Resources Without Limits or Throttling in spinframework spin

0
Medium
VulnerabilityCVE-2026-27887cvecve-2026-27887cwe-770cwe-774cwe-789
Published: Thu Feb 26 2026 (02/26/2026, 00:55:53 UTC)
Source: CVE Database V5
Vendor/Project: spinframework
Product: spin

Description

Spin is an open source developer tool for building and running serverless applications powered by WebAssembly. When Spin is configured to allow connections to a database or web server which could return responses of unbounded size (e.g. tables with many rows or large content bodies), Spin may in some cases attempt to buffer the entire response before delivering it to the guest, which can lead to the host process running out of memory, panicking, and crashing. In addition, a malicious guest application could incrementally insert a large number of rows or values into a database and then retrieve them all in a single query, leading to large host allocations. Spin 3.6.1, SpinKube 0.6.2, and `containerd-shim-spin` 0.22.1 have been patched to address the issue. As a workaround, configure Spin to only allow access to trusted databases and HTTP servers which limit response sizes.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:40:07 UTC

Technical Analysis

CVE-2026-27887 is a resource exhaustion vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the Spin framework, an open source tool for running serverless applications powered by WebAssembly. Spin, when configured to connect to databases or web servers that can return responses of unbounded size, may attempt to buffer entire large responses before passing them to guest applications. This buffering behavior can cause the host process to consume excessive memory, leading to panics and crashes. The vulnerability is exacerbated when a malicious guest application incrementally inserts a large volume of data into a database and subsequently retrieves all of it in a single query, causing large memory allocations on the host side. Affected versions include Spin prior to 3.6.1, SpinKube before 0.6.2, and containerd-shim-spin before 0.22.1. The vulnerability does not require authentication but does require some user interaction and low privileges. The CVSS 4.0 score is 6.9 (medium severity), reflecting the network attack vector, low complexity, partial attack prerequisites, and high impact on availability. No known exploits have been reported in the wild as of publication. The root cause lies in the lack of limits or throttling on resource allocation when handling large or unbounded responses, which can lead to denial-of-service conditions. The recommended mitigation is to upgrade to patched versions and configure Spin to only connect to trusted databases and HTTP servers that enforce response size limits, thereby preventing unbounded memory consumption.

Potential Impact

This vulnerability primarily impacts the availability of systems running Spin by enabling denial-of-service conditions through resource exhaustion. Organizations using Spin to run serverless applications that interact with databases or web services are at risk of host process crashes if untrusted or large data responses are processed without limits. This can disrupt application availability, cause service outages, and potentially lead to cascading failures in dependent systems. Attackers with low privileges and minimal user interaction can exploit this to degrade service reliability. Enterprises relying on Spin for critical workloads, especially those handling large datasets or with multi-tenant environments, face increased risk of operational disruption. Although confidentiality and integrity are not directly impacted, the availability loss can have significant business consequences, including downtime, loss of customer trust, and increased operational costs for recovery. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as awareness and exploit development may increase over time.

Mitigation Recommendations

1. Upgrade Spin to version 3.6.1 or later, SpinKube to 0.6.2 or later, and containerd-shim-spin to 0.22.1 or later to apply the official patches addressing this vulnerability. 2. Configure Spin environments to restrict connections only to trusted databases and HTTP servers that enforce strict response size limits to prevent unbounded data retrieval. 3. Implement application-level throttling or pagination when querying databases to avoid large single-response payloads. 4. Monitor memory usage of Spin host processes closely and set resource limits or alerts to detect abnormal consumption early. 5. Employ network segmentation and access controls to limit exposure of Spin instances to potentially malicious guest applications. 6. Conduct regular security reviews of serverless application configurations to ensure no untrusted external data sources are accessible. 7. Educate developers and operators about the risks of unbounded data responses and encourage secure coding and configuration practices. 8. Consider deploying runtime protections or sandboxing mechanisms that can detect and mitigate excessive resource consumption dynamically.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T15:19:29.716Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699fa148b7ef31ef0b77969d

Added to database: 2/26/2026, 1:26:32 AM

Last enriched: 3/5/2026, 11:40:07 AM

Last updated: 4/12/2026, 4:14:44 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses