The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner. If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. If the yauzl library encounters a filename that is considered illegal, it raises an exception that is uncaught by PeerTube, leading to a crash which repeats infinitely on startup.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Apr 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner. If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. If the yauzl library encounters a filename that is considered illegal, it raises an exception that is uncaught by PeerTube, leading to a crash which repeats infinitely on startup. | |
Title | PeerTube User Import Authenticated Persistent Denial of Service | |
Weaknesses | CWE-248 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-04-15T13:30:20.412Z
Reserved: 2025-04-14T21:01:55.917Z
Link: CVE-2025-32944

Updated: 2025-04-15T13:30:08.419Z

Status : Awaiting Analysis
Published: 2025-04-15T13:15:55.100
Modified: 2025-04-15T18:39:27.967
Link: CVE-2025-32944

No data.