Starlette is a lightweight ASGI framework/toolkit. Starting in version 0.39.0 and prior to version 0.49.1 , an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing in Starlette's FileResponse Range parsing/merging logic. This enables CPU exhaustion per request, causing denial‑of‑service for endpoints serving files (e.g., StaticFiles or any use of FileResponse). This vulnerability is fixed in 0.49.1.
References
Configurations
No configuration.
History
04 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Starlette is a lightweight ASGI framework/toolkit. Starting in version 0.39.0 and prior to version 0.49.1 , an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing in Starlette's FileResponse Range parsing/merging logic. This enables CPU exhaustion per request, causing denial‑of‑service for endpoints serving files (e.g., StaticFiles or any use of FileResponse). This vulnerability is fixed in 0.49.1. | |
| References |
|
28 Oct 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-28 21:15
Updated : 2025-11-04 18:16
NVD link : CVE-2025-62727
Mitre link : CVE-2025-62727
CVE.ORG link : CVE-2025-62727
JSON object : View
Products Affected
No product.
CWE
CWE-407
Inefficient Algorithmic Complexity
