Description
Pidgin 2.13.0 contains a denial of service vulnerability that allows local attackers to crash the application by providing an excessively long username string during account creation. Attackers can input a buffer of 1000 characters in the username field and trigger a crash when joining a chat, causing the application to become unavailable.
Published: 2026-03-21
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

An input validation flaw in Pidgin 2.13.0 (and versions 2.14.0–2.14.9) allows a local attacker to crash the program by submitting an unusually long username during account creation. The excessive length of about 1,000 characters causes the application to crash when the user attempts to join a chat, effectively making the messaging client unavailable. The flaw is attributable to improper handling of string input, reflected in CWE-1284 and CWE-807.

Affected Systems

The vulnerability affects the open‑source instant messaging client Pidgin, specifically version 2.13.0 and the 2.14.x family from 2.14.0 through 2.14.9. Users running any of these releases on Windows, macOS, or Linux are potentially exposed.

Risk and Exploitability

The CVSS score of 6.9 classifies the issue as high‑moderate severity, though the EPSS score of less than 1 % indicates a low likelihood of exploitation. Because the flaw requires a local user to create the malformed username, it is generally limited to compromised or physically accessible systems. The exploit path is straightforward: a local attacker supplies a 1,000‑character username, then attempts to join a chat, triggering a crash. The vulnerability is not listed in the CISA KEV catalog, further suggesting limited public exploitation.

Generated by OpenCVE AI on March 24, 2026 at 03:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the newest Pidgin release (≥2.14.10 or later) which contains the fix for the username handling bug.
  • After installing the update, restart Pidgin to ensure the patch is active.
  • If an upgrade is not immediately possible, prevent local users from creating accounts with excessively long usernames by enforcing a maximum username length of 100 characters or less.

Generated by OpenCVE AI on March 24, 2026 at 03:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:pidgin:pidgin:2.13.0:*:*:*:*:*:*:*

Tue, 24 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 02:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1284
References
Metrics threat_severity

None

threat_severity

Moderate


Sat, 21 Mar 2026 13:00:00 +0000

Type Values Removed Values Added
Description Pidgin 2.13.0 contains a denial of service vulnerability that allows local attackers to crash the application by providing an excessively long username string during account creation. Attackers can input a buffer of 1000 characters in the username field and trigger a crash when joining a chat, causing the application to become unavailable.
Title Pidgin 2.13.0 Denial of Service via Malformed Username
First Time appeared Pidgin
Pidgin pidgin
Weaknesses CWE-807
CPEs cpe:2.3:a:pidgin:pidgin:2.14.0:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.14.10:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.14.1:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.14.2:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.14.3:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.14.4:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.14.5:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.14.6:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.14.7:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.14.8:*:*:*:*:*:*:*
cpe:2.3:a:pidgin:pidgin:2.14.9:*:*:*:*:*:*:*
Vendors & Products Pidgin
Pidgin pidgin
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-24T14:31:19.687Z

Reserved: 2026-03-21T12:23:17.461Z

Link: CVE-2019-25544

cve-icon Vulnrichment

Updated: 2026-03-24T14:31:15.844Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-21T13:16:15.270

Modified: 2026-04-16T17:42:51.770

Link: CVE-2019-25544

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-21T12:46:48Z

Links: CVE-2019-25544 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:47:38Z

Weaknesses