CVE-2025-61301

7.5 HIGH

📋 TL;DR

This vulnerability in CAPEv2 allows attackers who can submit samples to cause denial-of-analysis by generating deeply nested or oversized behavior data that triggers MongoDB BSON limits or orjson recursion errors. This results in incomplete or missing behavioral analysis reports. Systems running vulnerable versions of CAPEv2 with the affected reporting modules are impacted.

💻 Affected Systems

Products:
  • CAPEv2
Versions: Versions up to commit 52e4b43 (2025-05-17)
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the vulnerable reporting/mongodb.py and reporting/jsondump.py modules. Requires MongoDB and orjson dependencies.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of malware analysis capabilities, preventing security teams from obtaining behavioral reports on submitted samples, potentially allowing malicious samples to go undetected.

🟠

Likely Case

Intermittent analysis failures for specific samples, causing gaps in security monitoring and requiring manual investigation of failed analyses.

🟢

If Mitigated

Limited impact with proper input validation and monitoring, where failed analyses are logged and alerts are generated for investigation.

🌐 Internet-Facing: MEDIUM - Attackers need to submit samples to the CAPEv2 instance, which typically requires some level of access or submission capability.
🏢 Internal Only: MEDIUM - Internal attackers with sample submission privileges can disrupt analysis operations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to submit samples to CAPEv2. The vulnerability is documented with proof-of-concept available in the GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check for commits after 52e4b43 (2025-05-17)

Vendor Advisory: https://github.com/kevoreilly/CAPEv2

Restart Required: Yes

Instructions:

1. Update CAPEv2 to the latest version from the official repository. 2. Check for fixes in reporting/mongodb.py and reporting/jsondump.py. 3. Restart CAPEv2 services to apply changes.

🔧 Temporary Workarounds

Implement input validation

all

Add validation to limit nesting depth and size of behavior data before processing

# Modify reporting modules to add validation logic
# Example: Add depth and size checks before MongoDB/orjson operations

Configure MongoDB limits

linux

Adjust MongoDB BSON document size limits and validation rules

mongod --setParameter maxBSONDepth=100
mongod --setParameter maxBSONObjectSize=16777216

🧯 If You Can't Patch

  • Restrict sample submission to trusted sources only
  • Monitor for analysis failures and implement alerting for repeated failures

🔍 How to Verify

Check if Vulnerable:

Check if your CAPEv2 version includes commit 52e4b43 or earlier by examining the git history or version files.

Check Version:

git log --oneline -1

Verify Fix Applied:

Verify that reporting/mongodb.py and reporting/jsondump.py have been updated with proper input validation and error handling for nested/oversized data.

📡 Detection & Monitoring

Log Indicators:

  • MongoDB BSON size limit errors
  • orjson recursion depth errors
  • Analysis report generation failures
  • Unexpected termination of reporting processes

Network Indicators:

  • Increased failed analysis submissions
  • Unusual patterns in sample submission rates

SIEM Query:

source="capev2.log" AND ("BSON" OR "orjson" OR "recursion" OR "depth limit") AND error

🔗 References

📤 Share & Export