UBUNTU-CVE-2025-59152

Source
https://ubuntu.com/security/CVE-2025-59152
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-59152.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-59152
Upstream
Withdrawn
2026-01-20T05:33:10Z
Published
2025-10-06T16:15:00Z
Modified
2026-01-20T18:51:07.014490Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. In version 2.17.0, rate limits can be completely bypassed by manipulating the X-Forwarded-For header. This renders IP-based rate limiting ineffective against determined attackers. Litestar's RateLimitMiddleware uses cache_key_from_request() to generate cache keys for rate limiting. When an X-Forwarded-For header is present, the middleware trusts it unconditionally and uses its value as part of the client identifier. Since clients can set arbitrary X-Forwarded-For values, each different spoofed IP creates a separate rate limit bucket. An attacker can rotate through different header values to avoid hitting any single bucket's limit. This affects any Litestar application using RateLimitMiddleware with default settings, which likely includes most applications that implement rate limiting. Version 2.18.0 contains a patch for the vulnerability.

References

Affected packages

Ubuntu:25.04 / litestar

Package

Name
litestar
Purl
pkg:deb/ubuntu/litestar@2.15.1-1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.15.1-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "python3-litestar",
            "binary_version": "2.15.1-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-59152.json"