The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner. If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. If the yauzl library encounters a filename that is considered illegal, it raises an exception that is uncaught by PeerTube, leading to a crash which repeats infinitely on startup.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Oct 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Framasoft
Framasoft peertube |
|
CPEs | cpe:2.3:a:framasoft:peertube:*:*:*:*:*:*:*:* | |
Vendors & Products |
Framasoft
Framasoft peertube |
Tue, 15 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Apr 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner. If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. If the yauzl library encounters a filename that is considered illegal, it raises an exception that is uncaught by PeerTube, leading to a crash which repeats infinitely on startup. | |
Title | PeerTube User Import Authenticated Persistent Denial of Service | |
Weaknesses | CWE-248 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-04-15T13:30:20.412Z
Reserved: 2025-04-14T21:01:55.917Z
Link: CVE-2025-32944

Updated: 2025-04-15T13:30:08.419Z

Status : Analyzed
Published: 2025-04-15T13:15:55.100
Modified: 2025-10-21T14:34:03.990
Link: CVE-2025-32944

No data.

No data.