Description
Consul and Consul Enterprise’s (“Consul”) key/value endpoint is vulnerable to denial of service (DoS) due to incorrect Content Length header validation. This vulnerability, CVE-2025-11374, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.
Published: 2025-10-28
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a flaw in Consul’s key/value store HTTP handling. An attacker can exploit the incorrect validation of the Content‑Length header when sending requests to the KV endpoint, causing the Consul daemon to consume excessive memory and become unresponsive. This results in an availability loss for services that rely on Consul’s data plane and is classified as CWE‑770, Large or Uncontrolled Resource Consumption.

Affected Systems

HashiCorp Consul Community Edition versions up to 1.21.9 and Consul Enterprise versions up to 1.21.5, 1.20.7 and 1.18.11 are affected. The fix is included in Community Edition 1.22.0 and Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, but the EPSS score of less than 1% shows that exploitation attempts are currently rare, and the vulnerability is not listed in CISA’s KEV catalog. It is inferred that the attack vector is network‑based: an attacker must reach the KV API over HTTP or HTTPS and craft a request with a mismatched Content‑Length header. The exploit is straightforward for anyone with network access to the service, so systems without proper segmentation may be at higher risk.

Generated by OpenCVE AI on April 20, 2026 at 15:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest fixed release: Consul Community Edition 1.22.0 or Consul Enterprise 1.22.0, 1.21.6, 1.20.8, or 1.18.12.
  • Restrict access to the KV endpoint to trusted internal networks or a secure service mesh to reduce exposure to untrusted traffic.
  • Monitor KV API traffic for abnormal request patterns and apply rate‑limiting or blocking policies against repeated malformed requests.

Generated by OpenCVE AI on April 20, 2026 at 15:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7g3r-8c6v-hfmr Consul key/value endpoint is vulnerable to denial of service
History

Mon, 22 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*
cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*

Thu, 30 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 29 Oct 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Hashicorp
Hashicorp consul
Vendors & Products Hashicorp
Hashicorp consul

Tue, 28 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Oct 2025 20:45:00 +0000

Type Values Removed Values Added
Description Consul and Consul Enterprise’s (“Consul”) key/value endpoint is vulnerable to denial of service (DoS) due to incorrect Content Length header validation. This vulnerability, CVE-2025-11374, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.
Title Consul's KV endpoint is vulnerable to denial of service
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Hashicorp Consul
cve-icon MITRE

Status: PUBLISHED

Assigner: HashiCorp

Published:

Updated: 2026-04-17T18:34:14.829Z

Reserved: 2025-10-06T15:34:09.965Z

Link: CVE-2025-11374

cve-icon Vulnrichment

Updated: 2025-10-28T20:36:00.377Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-28T21:15:37.300

Modified: 2025-12-22T16:05:52.177

Link: CVE-2025-11374

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-10-28T20:19:05Z

Links: CVE-2025-11374 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T16:00:10Z

Weaknesses