Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2025-46727
May 07, 2025
Rack is a modular Ruby web server interface. Prior to versions 2.2.14, 3.0.16, and 3.1.14, "Rack::QueryParser" parses query strings and "application/x-www-form-urlencoded" bodies into Ruby data structures without imposing any limit on the number of parameters, allowing attackers to send requests with extremely large numbers of parameters. The vulnerability arises because "Rack::QueryParser" iterates over each "&"-separated key-value pair and adds it to a Hash without enforcing an upper bound on the total number of parameters. This allows an attacker to send a single request containing hundreds of thousands (or more) of parameters, which consumes excessive memory and CPU during parsing. An attacker can trigger denial of service by sending specifically crafted HTTP requests, which can cause memory exhaustion or pin CPU resources, stalling or crashing the Rack server. This results in full service disruption until the affected worker is restarted. Versions 2.2.14, 3.0.16, and 3.1.14 fix the issue. Some other mitigations are available. One may use middleware to enforce a maximum query string size or parameter count, or employ a reverse proxy (such as Nginx) to limit request sizes and reject oversized query strings or bodies. Limiting request body sizes and query string lengths at the web server or CDN level is an effective mitigation.
Affected Packages
https://github.com/rack/rack.git (GITHUB):
Affected version(s) >=v2.0.9.2 <v2.2.14
Fix Suggestion:
Update to version v2.2.14
https://github.com/rack/rack.git (GITHUB):
Affected version(s) >=v3.0.1 <v3.0.16
Fix Suggestion:
Update to version v3.0.16
https://github.com/rack/rack.git (GITHUB):
Affected version(s) >=v3.1.0 <v3.1.14
Fix Suggestion:
Update to version v3.1.14
rack (RUBY):
Affected version(s) >=3.1.0 <3.1.14
Fix Suggestion:
Update to version 3.1.14
rack (RUBY):
Affected version(s) >=0.1.0 <2.2.14
Fix Suggestion:
Update to version 2.2.14
rack (RUBY):
Affected version(s) >=3.0.0 <3.0.16
Fix Suggestion:
Update to version 3.0.16
Additional Notes
The description of this vulnerability differs from MITRE.
Do you need more information?
Contact Us
CVSS v4
Base Score:
8.7
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
HIGH
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH
Weakness Type (CWE)
Allocation of Resources Without Limits or Throttling
Uncontrolled Resource Consumption
EPSS
Base Score:
0.29