ESI plugin does not have the limit for maximum inclusion depth, and that allows excessive memory consumption if malicious instructions are inserted. Users can use a new setting for the plugin (--max-inclusion-depth) to limit it. This issue affects Apache Traffic Server: from 10.0.0 through 10.0.5, from 9.0.0 through 9.2.10. Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue.
History

Tue, 01 Jul 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache traffic Server
CPEs cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache traffic Server

Fri, 20 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Jun 2025 10:15:00 +0000

Type Values Removed Values Added
Title trafficserver: Traffic Server ESI Inclusion Depth Vulnerability Apache Traffic Server: Remote DoS via memory exhaustion in ESI Plugin

Fri, 20 Jun 2025 03:15:00 +0000

Type Values Removed Values Added
Title trafficserver: Traffic Server ESI Inclusion Depth Vulnerability
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Important


Thu, 19 Jun 2025 10:45:00 +0000

Type Values Removed Values Added
Description ESI plugin does not have the limit for maximum inclusion depth, and that allows excessive memory consumption if malicious instructions are inserted. Users can use a new setting for the plugin (--max-inclusion-depth) to limit it. This issue affects Apache Traffic Server: from 10.0.0 through 10.0.5, from 9.0.0 through 9.2.10. Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue.
Weaknesses CWE-400
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-06-19T10:07:15.450Z

Updated: 2025-06-20T13:56:54.082Z

Reserved: 2025-06-09T23:10:28.606Z

Link: CVE-2025-49763

cve-icon Vulnrichment

Updated: 2025-06-20T13:56:20.661Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-19T10:15:21.887

Modified: 2025-07-01T20:15:05.673

Link: CVE-2025-49763

cve-icon Redhat

Severity : Important

Publid Date: 2025-06-19T10:07:15Z

Links: CVE-2025-49763 - Bugzilla