- Description
- The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner. If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. If the yauzl library encounters a filename that is considered illegal, it raises an exception that is uncaught by PeerTube, leading to a crash which repeats infinitely on startup.
- Source
- reefs@jfrog.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
- reefs@jfrog.com
- CWE-248
- Hype score
- Not currently trending
CVE-2025-32944 PeerTube Denial of Service via Unhandled Filename Exception in User Import https://t.co/ggJtWW72wO
@VulmonFeeds
15 Apr 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-32944 The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner. If user import is enabled (which is the defa… https://t.co/6TjOy4Vap8
@CVEnew
15 Apr 2025
275 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes