CVE-2026-25762

7.5 HIGH

📋 TL;DR

AdonisJS multipart file upload handler has a memory exhaustion vulnerability that allows attackers to cause denial of service by uploading specially crafted files. This affects all applications using vulnerable versions of @adonisjs/bodyparser. The vulnerability can lead to application crashes due to excessive memory consumption.

💻 Affected Systems

Products:
  • AdonisJS
  • @adonisjs/bodyparser
Versions: All versions before 10.1.3 and 11.0.0-next.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications that handle file uploads via multipart form data. Applications without file upload functionality are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application downtime due to process termination from memory exhaustion, potentially affecting all users of the service.

🟠

Likely Case

Service degradation or temporary unavailability for users during file upload operations, with automatic recovery after process restart.

🟢

If Mitigated

Minimal impact with proper rate limiting, file size restrictions, and monitoring in place to detect abnormal memory usage patterns.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only the ability to upload files to the vulnerable endpoint, making it accessible to attackers with minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.3 or 11.0.0-next.9

Vendor Advisory: https://github.com/adonisjs/core/security/advisories/GHSA-xx9g-fh25-4q64

Restart Required: Yes

Instructions:

1. Update @adonisjs/bodyparser to version 10.1.3 or 11.0.0-next.9 using npm or yarn. 2. Update package.json to lock the new version. 3. Restart the application server. 4. Test file upload functionality.

🔧 Temporary Workarounds

Implement file size limits

all

Configure maximum file size restrictions in AdonisJS bodyparser configuration to limit memory consumption

// In config/bodyparser.ts
const bodyParserConfig = {
  multipart: {
    maxSize: '10mb', // Adjust based on your needs
    // other configurations
  }
}

Disable file type detection

all

Turn off automatic file type detection in multipart processing if not required

// In config/bodyparser.ts
const bodyParserConfig = {
  multipart: {
    detectFileType: false,
    // other configurations
  }
}

🧯 If You Can't Patch

  • Implement strict rate limiting on file upload endpoints to prevent mass exploitation
  • Deploy a reverse proxy or WAF with request size limiting and DoS protection in front of the application

🔍 How to Verify

Check if Vulnerable:

Check package.json or package-lock.json for @adonisjs/bodyparser version. If version is below 10.1.3 (for v10) or not 11.0.0-next.9 or higher (for v11), the system is vulnerable.

Check Version:

npm list @adonisjs/bodyparser

Verify Fix Applied:

Verify @adonisjs/bodyparser version is 10.1.3 or higher (for v10) or 11.0.0-next.9 or higher (for v11) using npm list @adonisjs/bodyparser

📡 Detection & Monitoring

Log Indicators:

  • Abnormally high memory usage spikes during file upload operations
  • Process termination/crash logs related to out-of-memory errors
  • Unusually large file upload requests in application logs

Network Indicators:

  • Multiple large file upload requests from single IP addresses
  • Abnormal traffic patterns to file upload endpoints

SIEM Query:

source="application.logs" ("out of memory" OR "process terminated" OR "memory limit") AND ("upload" OR "multipart" OR "file")

🔗 References

📤 Share & Export