Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-32949


This vulnerability allows any authenticated user to cause the server to consume very large amounts of disk space when extracting a Zip Bomb. If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. The yauzl library does not contain any mechanism to detect or prevent extraction of a Zip Bomb https://en.wikipedia.org/wiki/Zip_bomb . Therefore, when using the User Import functionality with a Zip Bomb, PeerTube will try extracting the archive which will cause a disk space resource exhaustion.


Published

2025-04-15T15:16:09.607

Last Modified

2025-10-21T16:25:07.737

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-409

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application framasoft peertube < 7.1.1 Yes

References