Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33241: CWE-770: Allocation of Resources Without Limits or Throttling in salvo-rs salvo

0
High
VulnerabilityCVE-2026-33241cvecve-2026-33241cwe-770
Published: Mon Mar 23 2026 (03/23/2026, 23:41:50 UTC)
Source: CVE Database V5
Vendor/Project: salvo-rs
Product: salvo

Description

Salvo is a Rust web framework. Prior to version 0.89.3, Salvo's form data parsing implementations (`form_data()` method and `Extractible` macro) do not enforce payload size limits before reading request bodies into memory. This allows attackers to cause Out-of-Memory (OOM) conditions by sending extremely large payloads, leading to service crashes and denial of service. Version 0.89.3 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:11:08 UTC

Technical Analysis

Salvo is a Rust-based web framework used to build web applications and services. Prior to version 0.89.3, Salvo's form data parsing implementations, specifically the `form_data()` method and the `Extractible` macro, do not impose any restrictions on the size of the payloads they process. When a client sends form data, these methods read the entire request body into memory without enforcing size limits or throttling. This lack of resource control can be exploited by an attacker who sends extremely large payloads, causing the server to allocate excessive memory. The uncontrolled memory allocation can lead to Out-of-Memory (OOM) conditions, resulting in application crashes and denial of service. The vulnerability is classified under CWE-770, which concerns allocation of resources without limits or throttling. The CVSS 4.0 base score of 8.7 reflects the vulnerability's high impact on availability, ease of exploitation (no authentication or user interaction required), and network attack vector. The patch in version 0.89.3 introduces payload size limits to prevent such resource exhaustion attacks. Although no exploits have been observed in the wild, the vulnerability poses a significant risk to any service using vulnerable Salvo versions, especially those exposed to untrusted networks.

Potential Impact

The primary impact of this vulnerability is denial of service through resource exhaustion. Attackers can cause Salvo-based applications to crash by sending large form data payloads, leading to service unavailability. This can disrupt business operations, degrade user experience, and potentially cause cascading failures if the affected service is critical in a larger infrastructure. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely by any attacker with network access to the vulnerable service. Organizations relying on Salvo for web services, APIs, or microservices are at risk of downtime and potential reputational damage. Additionally, repeated exploitation attempts could increase operational costs due to incident response and recovery efforts. Although confidentiality and integrity are not directly impacted, the availability impact alone is significant, especially for high-traffic or critical applications.

Mitigation Recommendations

Organizations should immediately upgrade Salvo to version 0.89.3 or later, which includes the patch enforcing payload size limits during form data parsing. Until upgrading is possible, implement network-level protections such as rate limiting, request size restrictions, and Web Application Firewalls (WAFs) configured to block unusually large POST requests targeting form data endpoints. Monitoring application logs for abnormal request sizes and memory usage spikes can help detect exploitation attempts early. Developers should review their use of Salvo's form data parsing methods to ensure they do not bypass the patched mechanisms. Additionally, consider deploying application-level resource quotas and timeouts to limit the impact of resource exhaustion attacks. Regularly audit dependencies for updates and security patches to maintain a secure software supply chain.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T02:42:27.508Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1d434f4197a8e3ba042a0

Added to database: 3/24/2026, 12:00:52 AM

Last enriched: 3/31/2026, 8:11:08 PM

Last updated: 5/2/2026, 6:35:29 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses