We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47287

Tornado vulnerable to excessive logging caused by malformed multipart form data



Description

Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.

Reserved 2025-05-05 | Published 2025-05-15 | Updated 2025-05-29 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 6.5.0
affected

References

github.com/...ornado/security/advisories/GHSA-7cx3-6m66-7c5m

github.com/...ommit/b39b892bf78fe8fea01dd45199aa88307e7162f3

cve.org (CVE-2025-47287)

nvd.nist.gov (CVE-2025-47287)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47287

Support options

Helpdesk Chat, Email, Knowledgebase