CVE-2025-67899

2.9 LOW

📋 TL;DR

CVE-2025-67899 is an unbounded recursion vulnerability in uriparser library versions through 0.9.9 that allows stack exhaustion via specially crafted input with many commas. This affects any application using vulnerable uriparser versions for URI parsing, potentially causing denial of service. The impact is limited to availability rather than confidentiality or integrity.

💻 Affected Systems

Products:
  • uriparser
Versions: All versions through 0.9.9
Operating Systems: All platforms where uriparser is used
Default Config Vulnerable: ⚠️ Yes
Notes: Any application linking against vulnerable uriparser versions is affected when parsing URIs with the ParseMustBeSegmentNzNc function or similar.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash or system instability due to stack overflow, leading to denial of service for all users of the affected service.

🟠

Likely Case

Application crash or hang when processing maliciously crafted URIs containing excessive commas, resulting in temporary service disruption.

🟢

If Mitigated

Minimal impact with proper input validation and resource limits in place; at most a single request failure.

🌐 Internet-Facing: MEDIUM - Internet-facing services parsing user-controlled URIs could be DoS'd, but requires specific malicious input.
🏢 Internal Only: LOW - Internal systems typically process trusted URIs, reducing attack surface significantly.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept demonstrates simple URI construction with many commas; weaponization for DoS attacks is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.10.0 and later

Vendor Advisory: https://github.com/uriparser/uriparser/security/advisories

Restart Required: Yes

Instructions:

1. Update uriparser to version 0.10.0 or later. 2. Rebuild and redeploy any applications using uriparser. 3. Restart affected services.

🔧 Temporary Workarounds

Input validation and length limits

all

Implement input validation to reject URIs with excessive commas before parsing

Stack limit enforcement

linux

Use system or runtime stack size limits to prevent complete exhaustion

ulimit -s 8192 # Linux example to limit stack size

🧯 If You Can't Patch

  • Implement strict input validation to reject URIs with more than a reasonable number of commas (e.g., >100)
  • Deploy WAF rules to block requests with excessive commas in URI components

🔍 How to Verify

Check if Vulnerable:

Check uriparser version: ldd /path/to/application | grep uriparser && check linked version

Check Version:

pkg-config --modversion uriparser 2>/dev/null || uriparser-config --version 2>/dev/null || check package manager

Verify Fix Applied:

Verify uriparser version is 0.10.0 or later and test with known malicious URI containing many commas

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with stack overflow errors
  • High memory usage spikes during URI parsing
  • Repeated failed requests with unusual URI patterns

Network Indicators:

  • Incoming requests with URIs containing hundreds of commas
  • Sudden increase in failed requests to URI parsing endpoints

SIEM Query:

source="application.logs" AND ("stack overflow" OR "segmentation fault") AND process="*uriparser*"

🔗 References

📤 Share & Export