CVE-2026-33013: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in micronaut-projects micronaut-core
Micronaut Framework is a JVM-based full stack Java framework designed for building modular, easily testable JVM applications. Versions prior to both 4.10.16 and 3.10.5 do not correctly handle descending array index order during form-urlencoded body binding in theJsonBeanPropertyBinder::expandArrayToThreshold, which allows remote attackers to cause a DoS (non-terminating loop, CPU exhaustion, and OutOfMemoryError) via crafted indexed form parameters (e.g., authors[1].name followed by authors[0].name). This issue has been fixed in versions 4.10.16 and 3.10.5.
AI Analysis
Technical Summary
CVE-2026-33013 is a vulnerability in the Micronaut Framework's core library (micronaut-core) affecting versions >=4.0.0-M1 and <4.10.16, and all versions below 3.10.5. The root cause is a logic flaw in theJsonBeanPropertyBinder::expandArrayToThreshold method, which incorrectly handles descending array index orders during the binding of form-urlencoded request bodies. Specifically, when processing indexed form parameters such as authors[1].name followed by authors[0].name, the method enters a non-terminating loop due to an unreachable exit condition. This infinite loop causes excessive CPU consumption and eventually triggers an OutOfMemoryError, resulting in a denial of service (DoS) condition. The vulnerability is remotely exploitable without authentication or user interaction, making it a critical availability risk for any JVM applications using the affected Micronaut versions. The flaw is categorized under CWE-835 (Loop with Unreachable Exit Condition). Although no known exploits are currently reported in the wild, the vulnerability's nature and high CVSS score (8.2) indicate a strong potential for exploitation. The issue has been addressed in Micronaut versions 4.10.16 and 3.10.5, where the array index handling logic was corrected to prevent infinite looping. This vulnerability primarily impacts backend services and APIs that rely on Micronaut for HTTP request processing and data binding, especially those accepting form-urlencoded data with complex array parameters.
Potential Impact
The primary impact of CVE-2026-33013 is denial of service due to infinite looping and resource exhaustion. Exploitation can cause affected Micronaut-based applications to consume excessive CPU and memory resources, leading to application crashes or unresponsiveness. This disrupts service availability, potentially affecting business operations, customer experience, and critical backend processes. Since the vulnerability is remotely exploitable without authentication or user interaction, attackers can launch DoS attacks at scale, targeting public-facing APIs or services. Organizations relying on Micronaut for microservices, web applications, or APIs are at risk of service outages. The impact extends to cloud environments, containerized deployments, and enterprise JVM applications using vulnerable Micronaut versions. While confidentiality and integrity are not directly affected, the availability impact can have cascading effects on dependent systems and services. The lack of known exploits in the wild currently limits immediate risk, but the ease of exploitation and high severity score warrant urgent remediation to prevent future attacks.
Mitigation Recommendations
1. Upgrade all affected Micronaut Framework instances to version 4.10.16 or later, or 3.10.5 or later, where the vulnerability is fixed. 2. Implement input validation to detect and reject malformed or suspicious indexed form parameters that could trigger the infinite loop. 3. Apply rate limiting and request throttling on endpoints accepting form-urlencoded data to reduce the risk of resource exhaustion from repeated exploit attempts. 4. Monitor application logs and performance metrics for unusual CPU or memory usage spikes indicative of attempted exploitation. 5. Use Web Application Firewalls (WAFs) with custom rules to block or alert on suspicious form parameter patterns resembling the exploit vector. 6. Conduct code reviews and testing for similar array index handling issues in custom data binding logic. 7. Employ runtime application self-protection (RASP) tools to detect and mitigate infinite loop conditions dynamically. 8. Ensure robust incident response plans are in place to quickly isolate and remediate affected services if exploitation is detected. These measures combined will reduce the attack surface and mitigate the risk of denial of service caused by this vulnerability.
Affected Countries
United States, Germany, India, Japan, Brazil, United Kingdom, France, Canada, Australia, South Korea
CVE-2026-33013: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in micronaut-projects micronaut-core
Description
Micronaut Framework is a JVM-based full stack Java framework designed for building modular, easily testable JVM applications. Versions prior to both 4.10.16 and 3.10.5 do not correctly handle descending array index order during form-urlencoded body binding in theJsonBeanPropertyBinder::expandArrayToThreshold, which allows remote attackers to cause a DoS (non-terminating loop, CPU exhaustion, and OutOfMemoryError) via crafted indexed form parameters (e.g., authors[1].name followed by authors[0].name). This issue has been fixed in versions 4.10.16 and 3.10.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33013 is a vulnerability in the Micronaut Framework's core library (micronaut-core) affecting versions >=4.0.0-M1 and <4.10.16, and all versions below 3.10.5. The root cause is a logic flaw in theJsonBeanPropertyBinder::expandArrayToThreshold method, which incorrectly handles descending array index orders during the binding of form-urlencoded request bodies. Specifically, when processing indexed form parameters such as authors[1].name followed by authors[0].name, the method enters a non-terminating loop due to an unreachable exit condition. This infinite loop causes excessive CPU consumption and eventually triggers an OutOfMemoryError, resulting in a denial of service (DoS) condition. The vulnerability is remotely exploitable without authentication or user interaction, making it a critical availability risk for any JVM applications using the affected Micronaut versions. The flaw is categorized under CWE-835 (Loop with Unreachable Exit Condition). Although no known exploits are currently reported in the wild, the vulnerability's nature and high CVSS score (8.2) indicate a strong potential for exploitation. The issue has been addressed in Micronaut versions 4.10.16 and 3.10.5, where the array index handling logic was corrected to prevent infinite looping. This vulnerability primarily impacts backend services and APIs that rely on Micronaut for HTTP request processing and data binding, especially those accepting form-urlencoded data with complex array parameters.
Potential Impact
The primary impact of CVE-2026-33013 is denial of service due to infinite looping and resource exhaustion. Exploitation can cause affected Micronaut-based applications to consume excessive CPU and memory resources, leading to application crashes or unresponsiveness. This disrupts service availability, potentially affecting business operations, customer experience, and critical backend processes. Since the vulnerability is remotely exploitable without authentication or user interaction, attackers can launch DoS attacks at scale, targeting public-facing APIs or services. Organizations relying on Micronaut for microservices, web applications, or APIs are at risk of service outages. The impact extends to cloud environments, containerized deployments, and enterprise JVM applications using vulnerable Micronaut versions. While confidentiality and integrity are not directly affected, the availability impact can have cascading effects on dependent systems and services. The lack of known exploits in the wild currently limits immediate risk, but the ease of exploitation and high severity score warrant urgent remediation to prevent future attacks.
Mitigation Recommendations
1. Upgrade all affected Micronaut Framework instances to version 4.10.16 or later, or 3.10.5 or later, where the vulnerability is fixed. 2. Implement input validation to detect and reject malformed or suspicious indexed form parameters that could trigger the infinite loop. 3. Apply rate limiting and request throttling on endpoints accepting form-urlencoded data to reduce the risk of resource exhaustion from repeated exploit attempts. 4. Monitor application logs and performance metrics for unusual CPU or memory usage spikes indicative of attempted exploitation. 5. Use Web Application Firewalls (WAFs) with custom rules to block or alert on suspicious form parameter patterns resembling the exploit vector. 6. Conduct code reviews and testing for similar array index handling issues in custom data binding logic. 7. Employ runtime application self-protection (RASP) tools to detect and mitigate infinite loop conditions dynamically. 8. Ensure robust incident response plans are in place to quickly isolate and remediate affected services if exploitation is detected. These measures combined will reduce the attack surface and mitigate the risk of denial of service caused by this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T17:22:14.665Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bcda04e32a4fbe5f30467a
Added to database: 3/20/2026, 5:24:20 AM
Last enriched: 3/27/2026, 6:49:49 PM
Last updated: 5/2/2026, 12:11:36 PM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.