Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32145: CWE-770 Allocation of Resources Without Limits or Throttling in gleam-wisp wisp

0
High
VulnerabilityCVE-2026-32145cvecve-2026-32145cwe-770
Published: Thu Apr 02 2026 (04/02/2026, 10:30:47 UTC)
Source: CVE Database V5
Vendor/Project: gleam-wisp
Product: wisp

Description

Allocation of Resources Without Limits or Throttling vulnerability in gleam-wisp wisp allows a denial of service via multipart form body parsing. The multipart_body function bypasses configured max_body_size and max_files_size limits. When a multipart boundary is not present in a chunk, the parser takes the MoreRequiredForBody path, which appends the chunk to the output but passes the quota unchanged to the recursive call. Only the final chunk containing the boundary is counted via decrement_quota. The same pattern exists in multipart_headers, where MoreRequiredForHeaders recurses without calling decrement_body_quota. An unauthenticated attacker can exhaust server memory or disk by sending arbitrarily large multipart form submissions in a single HTTP request. This issue affects wisp: from 0.2.0 before 2.2.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 10:53:21 UTC

Technical Analysis

CVE-2026-32145 is a resource exhaustion vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the multipart form body parsing logic in the gleam-wisp wisp web framework. The core issue lies in the multipart_body and multipart_headers functions, which recursively parse multipart HTTP requests. These functions bypass the enforcement of configured maximum body size (max_body_size) and maximum files size (max_files_size) limits because the quota decrementing logic is only triggered upon encountering the multipart boundary in the final chunk. When chunks without boundaries are processed, the parser appends data to output buffers but does not reduce the quota, allowing an attacker to send very large multipart payloads that consume excessive memory or disk resources. This flaw can be exploited remotely by an unauthenticated attacker simply by sending a crafted HTTP request with a large multipart form submission. The vulnerability affects wisp versions starting from 0.2.0 up to but not including 2.2.2. The CVSS 4.0 base score is 8.7 (high), reflecting the ease of exploitation (network vector, no authentication, no user interaction) and the severe impact on availability through denial of service. No patches or exploit code are currently publicly available, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

The primary impact of CVE-2026-32145 is denial of service (DoS) through resource exhaustion. By sending a single HTTP request with a large multipart form body, an attacker can cause the server running the vulnerable wisp framework to consume excessive memory or disk space, potentially leading to application crashes, degraded performance, or complete service unavailability. This can disrupt business operations, degrade user experience, and increase operational costs due to recovery efforts. Since the vulnerability requires no authentication and can be triggered remotely, it poses a significant risk to any internet-facing services using affected wisp versions. Organizations relying on wisp for web applications or APIs may face increased downtime and potential cascading failures in dependent systems. Additionally, denial of service attacks can be leveraged as part of multi-vector campaigns, amplifying their impact. The lack of throttling or limits enforcement also raises concerns about potential exploitation in high-volume automated attacks.

Mitigation Recommendations

To mitigate CVE-2026-32145, organizations should upgrade the wisp framework to version 2.2.2 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, implement the following practical mitigations: 1) Deploy web application firewalls (WAFs) or reverse proxies that enforce strict limits on HTTP request body sizes and multipart form submissions to block oversized payloads before they reach the application. 2) Configure network-level rate limiting and connection throttling to reduce the risk of large or repeated multipart requests from the same source. 3) Monitor application logs and resource usage metrics for unusual spikes in memory or disk consumption related to HTTP requests. 4) Employ runtime application self-protection (RASP) or middleware that can detect and reject malformed or boundary-less multipart requests. 5) Isolate critical services and implement resource quotas at the operating system or container level to limit the impact of resource exhaustion. 6) Conduct regular security assessments and fuzz testing focused on multipart parsing to identify similar issues proactively. These measures, combined with timely patching, will reduce the risk and impact of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
EEF
Date Reserved
2026-03-10T22:37:29.212Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ce471be6bfc5ba1dcbccc8

Added to database: 4/2/2026, 10:38:19 AM

Last enriched: 4/2/2026, 10:53:21 AM

Last updated: 4/3/2026, 7:01:52 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses