Metrics
Affected Vendors & Products
No advisories yet.
Solution
Update the library to its latest stable release, if not possible backport the fix commit 2f082ec31261f556969160143ba94875d783971a
Workaround
No workaround given by the vendor.
Tue, 21 Oct 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 20 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 20 Oct 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Use After Free in WebSocket server implementation in lws_handshake_server in warmcat libwebsockets may allow an attacker, in specific configurations where the user provides a callback function that handles LWS_CALLBACK_HTTP_CONFIRM_UPGRADE, to achieve denial of service. | |
Title | Use After Free in libwebsockets WebSocket server | |
Weaknesses | CWE-416 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-10-20T13:54:19.569Z
Reserved: 2025-10-13T09:56:10.952Z
Link: CVE-2025-11677

Updated: 2025-10-20T13:54:12.114Z

Status : Received
Published: 2025-10-20T14:15:39.357
Modified: 2025-10-20T14:15:39.357
Link: CVE-2025-11677


No data.