CVE-2025-47287

Published May 15, 2025

Last updated a month ago

CVSS high 7.5
Python
Tornado

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-47287 affects the Tornado Python web framework and asynchronous networking library. The vulnerability stems from how Tornado's `multipart/form-data` parser handles errors. When the parser encounters malformed data, it logs a warning but continues parsing the remaining data instead of halting the process. This behavior allows remote attackers to generate a high volume of logs by sending crafted requests with malformed multipart form data. The excessive logging can overwhelm the logging subsystem, leading to a denial-of-service (DoS) attack because the logging subsystem operates synchronously. All Tornado versions prior to 6.5.0 are affected. A fix is available by upgrading to Tornado version 6.5.0. As a workaround, blocking `Content-Type: multipart/form-data` in a proxy can mitigate the risk.

Description
Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.
Source
security-advisories@github.com
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Severity
HIGH

Weaknesses

security-advisories@github.com
CWE-770

Social media

Hype score
Not currently trending
  1. ⚠️ CVE-2025-47287 Alert: #Ubuntu’s Tornado web server has a resource exhaustion flaw—attackers can trigger DoS via malformed requests. 📌 Affected versions: 22.04-25.04 🔐 Fix: sudo apt upgrade python3-tornado. Read more: 👉 https://t.co/Mqadg3gG1F #Py

    @Cezar_H_Linux

    2 Jun 2025

    40 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Critical update for #python-tornado6 users! CVE-2025-47287 (CVSS 8.7) lets attackers crash systems via malformed HTTP data. Patch SUSE Linux 15 SP7 now: ✅ zypper patch ✅ YaST update Read more: 👇https://t.co/D2GFO0fmme #InfoSec #SUSE https://t.co/T4FUuf98rA

    @Cezar_H_Linux

    24 May 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Threat Alert: High DoS Risk: Tornado's Default Parser Exposes Apps (CVE-2025-47287) CVE-2025-47287 Severity: 🔴 High Maturity: 💢 Emerging Learn more: https://t.co/PVLGWF4USw #CyberSecurity #ThreatIntel #InfoSec

    @fletch_ai

    20 May 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. ⚠️⚠️ CVE-2025-47287: High DoS Risk: Tornado’s Default Parser Exposes Apps 🎯1.4M+ Results are found on the https://t.co/pb16tGYaKe nearly year. 🔗FOFA Link: https://t.co/LoDPA2djr0 FOFA Query:app="Tornado-Server" 🔖Refer:https://t.co/T1HkGOqAsR #OSINT #FOFA #Cyber

    @fofabot

    19 May 2025

    855 Impressions

    3 Retweets

    11 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  5. 🚨Alert🚨CVE-2025-47287 : A Denial of Service (DoS) Vulnerability Exists in https://t.co/qeefU6x6io affects versions prior to 6.5.0. 📊 2.2M+ Services are found on the https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/sArfLGsXqo 👇Query HUNTER : https://t.co/hJ

    @HunterMapping

    19 May 2025

    2392 Impressions

    7 Retweets

    44 Likes

    9 Bookmarks

    1 Reply

    0 Quotes