GHSA-287x-9rff-qvcg

Suggest an improvement
Source
https://github.com/advisories/GHSA-287x-9rff-qvcg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-287x-9rff-qvcg/GHSA-287x-9rff-qvcg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-287x-9rff-qvcg
Aliases
  • CVE-2025-53604
Published
2025-07-05T03:30:23Z
Modified
2025-07-07T18:12:28.714370Z
Severity
  • 4.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L CVSS Calculator
Summary
Rust Web Push is vulnerable to a DoS attack via a large integer in a Content-Length header
Details

The web-push crate before 0.10.4 for Rust allows a denial of service (memory consumption) in the built-in clients via a large integer in a Content-Length header. The patch was initially made available in version 0.10.3, but version 0.10.3 has since been yanked.

Database specific
{
    "nvd_published_at": "2025-07-05T01:15:28Z",
    "github_reviewed_at": "2025-07-07T17:25:25Z",
    "github_reviewed": true,
    "severity": "MODERATE",
    "cwe_ids": [
        "CWE-130"
    ]
}
References

Affected packages

crates.io / web-push

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.10.4

Database specific

{
    "last_known_affected_version_range": "<= 0.10.2"
}