CVE-2025-62162

7.5 HIGH

📋 TL;DR

A vulnerability in cel-rust allows attackers to cause denial of service by sending specially crafted CEL expressions. This affects systems using cel-rust versions 0.10.0 through 0.11.3 to evaluate untrusted user input, such as APIs that process user-supplied expressions. The parser panics and terminates the process when encountering malformed input.

💻 Affected Systems

Products:
  • cel-rust
Versions: 0.10.0 through 0.11.3
Operating Systems: All platforms running Rust applications
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when evaluating untrusted CEL expressions. Systems using cel-rust with trusted expressions only are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability due to process termination, potentially affecting multiple services if cel-rust is used in critical components.

🟠

Likely Case

Service disruption for applications evaluating untrusted CEL expressions, leading to temporary downtime until processes restart.

🟢

If Mitigated

Minimal impact if input validation or rate limiting prevents malicious payloads from reaching the vulnerable parser.

🌐 Internet-Facing: HIGH - Internet-facing APIs accepting CEL expressions are directly exploitable by unauthenticated attackers.
🏢 Internal Only: MEDIUM - Internal systems evaluating untrusted expressions remain vulnerable but have reduced attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed CEL expressions to vulnerable endpoints. No authentication needed if API is exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.11.4

Vendor Advisory: https://github.com/cel-rust/cel-rust/security/advisories/GHSA-wxwx-9fh7-5mrw

Restart Required: Yes

Instructions:

1. Update Cargo.toml to require cel-rust >=0.11.4. 2. Run 'cargo update'. 3. Rebuild and redeploy application. 4. Restart affected services.

🔧 Temporary Workarounds

Input validation

all

Implement strict validation of CEL expressions before passing to parser

Rate limiting

all

Limit request frequency to prevent DoS attacks

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block malformed CEL expressions
  • Isolate vulnerable services behind reverse proxies with request filtering

🔍 How to Verify

Check if Vulnerable:

Check Cargo.lock or Cargo.toml for cel-rust dependency version between 0.10.0 and 0.11.3

Check Version:

grep -A2 -B2 'cel-rust' Cargo.lock

Verify Fix Applied:

Confirm cel-rust version is 0.11.4 or higher in Cargo.lock

📡 Detection & Monitoring

Log Indicators:

  • Process termination/crash logs from cel-rust applications
  • Panic messages containing 'cel-rust' or 'parser'

Network Indicators:

  • Unusual volume of requests to CEL expression endpoints
  • Requests containing malformed CEL syntax

SIEM Query:

source="application.logs" AND ("panic" OR "crash") AND "cel-rust"

🔗 References

📤 Share & Export