protobuf-python, Denial of Service, CVE-2025-XXXXX (High)

Listen to this Post

How the CVE Works

The vulnerability in protobuf-python arises when parsing untrusted Protocol Buffers data containing deeply nested recursive groups or messages. The pure-Python implementation fails to handle excessive recursion, leading to a stack overflow and crash. Attackers can craft malicious payloads with recursive structures (e.g., `SGROUP` tags) to trigger unbounded recursion, exhausting system resources and causing a denial of service. This affects environments where `PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=python` is set or where the default pure-Python backend is used.

DailyCVE Form

Platform: protobuf-python
Version: <4.25.8, 5.26.0rc1-5.29.5, 6.30.0rc1-6.31.1
Vulnerability: DoS via recursion
Severity: High
Date: Jun 16, 2025

Prediction: Patch by Jun 30, 2025

What Undercode Say

Check protobuf version
python -c "import google.protobuf; print(google.protobuf.<strong>version</strong>)"
Mitigation command
export PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=cpp

How Exploit

Craft malicious `.proto` with recursive structures:

message Exploit {
required Exploit recursive = 1;
}

Protection from this CVE

  • Update to 4.25.8, 5.29.5, or 6.31.1
  • Use CPython backend (PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=cpp)

Impact

  • Service crashes
  • Resource exhaustion

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top