Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-49763— Apache Traffic Server: Remote DoS via memory exhaustion in ESI Plugin

EPSS 3.37% · P87
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-49763

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache Traffic Server: Remote DoS via memory exhaustion in ESI Plugin
Source: NVD (National Vulnerability Database)
Vulnerability Description
ESI plugin does not have the limit for maximum inclusion depth, and that allows excessive memory consumption if malicious instructions are inserted. Users can use a new setting for the plugin (--max-inclusion-depth) to limit it. This issue affects Apache Traffic Server: from 10.0.0 through 10.0.5, from 9.0.0 through 9.2.10. Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Traffic Server(ATS) 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Traffic Server(ATS)是美国阿帕奇(Apache)基金会的一套可扩展的HTTP代理和缓存服务器。 Apache Traffic Server(ATS) 10.0.0至10.0.5版本和9.0.0至9.2.10版本存在资源管理错误漏洞,该漏洞源于ESI插件未限制最大包含深度可能导致内存消耗过度。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Traffic Server 10.0.0 ~ 10.0.5 -

II. Public POCs for CVE-2025-49763

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-49763

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2025-06-19 · 3 CVEs total

CVE-2025-32896Apache SeaTunnel: Unauthenticated insecure access
CVE-2025-31698Apache Traffic Server: Client IP address from PROXY protocol is not used for ACL

IV. Related Vulnerabilities

V. Comments for CVE-2025-49763

No comments yet


Leave a comment