Malicious or unintentional API requests can be used to add significant amount of data to caches. Caches may evict information that is required to operate the web frontend, which leads to unavailability of the component. Please deploy the provided updates and patch releases. No publicly available exploits are known
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 31 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 31 Oct 2025 09:00:00 +0000

Type Values Removed Values Added
Description Malicious or unintentional API requests can be used to add significant amount of data to caches. Caches may evict information that is required to operate the web frontend, which leads to unavailability of the component. Please deploy the provided updates and patch releases. No publicly available exploits are known
Weaknesses CWE-400
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2025-10-31T18:10:29.713Z

Reserved: 2025-03-18T08:39:46.884Z

Link: CVE-2025-30188

cve-icon Vulnrichment

Updated: 2025-10-31T18:10:23.110Z

cve-icon NVD

Status : Received

Published: 2025-10-31T09:15:47.133

Modified: 2025-10-31T09:15:47.133

Link: CVE-2025-30188

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.