The mikecao/flight PHP framework in versions prior to v1.2 is vulnerable to Denial of Service (DoS) attacks due to eager loading of request bodies in the Request class constructor. The framework automatically reads the entire request body on every HTTP request, regardless of whether the application needs it. An attacker can exploit this by sending requests with large payloads, causing excessive memory consumption and potentially exhausting available server memory, leading to application crashes or service unavailability. The vulnerability was fixed in v1.2 by implementing lazy loading of request bodies.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Sep 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The mikecao/flight PHP framework in versions prior to v1.2 is vulnerable to Denial of Service (DoS) attacks due to eager loading of request bodies in the Request class constructor. The framework automatically reads the entire request body on every HTTP request, regardless of whether the application needs it. An attacker can exploit this by sending requests with large payloads, causing excessive memory consumption and potentially exhausting available server memory, leading to application crashes or service unavailability. The vulnerability was fixed in v1.2 by implementing lazy loading of request bodies. | |
Title | Denial of Service (DoS) vulnerability in mikecao/flight | |
Weaknesses | CWE-770 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Checkmarx
Published:
Updated: 2025-09-03T13:20:06.873Z
Reserved: 2025-08-27T09:12:29.906Z
Link: CVE-2014-125127

No data.

Status : Received
Published: 2025-09-03T09:15:32.187
Modified: 2025-09-03T09:15:32.187
Link: CVE-2014-125127

No data.

No data.