CVE-2025-47287

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-47287
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-47287.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-47287
Aliases
Downstream
Related
Published
2025-05-15T21:17:55Z
Modified
2025-10-10T17:45:21.836681Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Tornado vulnerable to excessive logging caused by malformed multipart form data
Details

Tornado is a Python web framework and asynchronous networking library. When Tornado's multipart/form-data parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking Content-Type: multipart/form-data in a proxy.

References

Affected packages

Git / github.com/tornadoweb/tornado

Affected ranges

Type
GIT
Repo
https://github.com/tornadoweb/tornado
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.2.0
v1.2.1

v2.*

v2.0.0
v2.1.0
v2.1.1
v2.2.0
v2.2.1
v2.3.0
v2.4.0
v2.4.1

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.1.0
v3.1.1
v3.2.0
v3.2.0b1
v3.2.0b2
v3.2.1
v3.2.2

v4.*

v4.0.0
v4.0.0b1
v4.0.0b2
v4.0.0b3
v4.0.1
v4.0.2
v4.1.0
v4.1.0b1
v4.1.0b2
v4.2.0
v4.2.0b1
v4.2.1
v4.3.0
v4.3.0b1
v4.3.0b2
v4.4.0
v4.4.0b1
v4.4.1
v4.4.2
v4.4.3
v4.5.0
v4.5.1
v4.5.2
v4.5.3

v5.*

v5.0.0
v5.0.1
v5.1.0
v5.1.0b1

v6.*

v6.0.0
v6.0.0b1
v6.1.0
v6.1.0b1
v6.1.0b2
v6.2.0
v6.2.0b1
v6.2.0b2
v6.3.0
v6.3.0b1
v6.3.1
v6.4.0
v6.4.0b1
v6.4.1
v6.5.0b1