mayswind ezbookkeeping versions 1.2.0 and earlier contain a critical vulnerability in JSON and XML file import processing. The application fails to validate nesting depth during parsing operations, allowing authenticated attackers to trigger denial of service conditions by uploading deeply nested malicious files. This results in CPU exhaustion, service degradation, or complete service unavailability.
References
| Link | Resource |
|---|---|
| https://github.com/ictrun/EBK-SA-2025-001 | Exploit Third Party Advisory |
Configurations
History
20 Feb 2026, 20:08
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Mayswind ezbookkeeping
Mayswind |
|
| References | () https://github.com/ictrun/EBK-SA-2025-001 - Exploit, Third Party Advisory | |
| Summary |
|
|
| CPE | cpe:2.3:a:mayswind:ezbookkeeping:*:*:*:*:*:*:*:* |
18 Feb 2026, 17:21
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-674 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
18 Feb 2026, 16:22
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 16:22
Updated : 2026-02-20 20:08
NVD link : CVE-2025-65519
Mitre link : CVE-2025-65519
CVE.ORG link : CVE-2025-65519
JSON object : View
Products Affected
mayswind
- ezbookkeeping
CWE
CWE-674
Uncontrolled Recursion
