This vulnerability allows any authenticated user to cause the server to consume very large amounts of disk space when extracting a Zip Bomb.

If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. The yauzl library does not contain any mechanism to detect or prevent extraction of a Zip Bomb https://en.wikipedia.org/wiki/Zip_bomb . Therefore, when using the User Import functionality with a Zip Bomb, PeerTube will try extracting the archive which will cause a disk space resource exhaustion.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-10959 This vulnerability allows any authenticated user to cause the server to consume very large amounts of disk space when extracting a Zip Bomb. If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. The yauzl library does not contain any mechanism to detect or prevent extraction of a Zip Bomb https://en.wikipedia.org/wiki/Zip_bomb . Therefore, when using the User Import functionality with a Zip Bomb, PeerTube will try extracting the archive which will cause a disk space resource exhaustion.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 21 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Framasoft
Framasoft peertube
CPEs cpe:2.3:a:framasoft:peertube:*:*:*:*:*:*:*:*
Vendors & Products Framasoft
Framasoft peertube

Tue, 15 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Description This vulnerability allows any authenticated user to cause the server to consume very large amounts of disk space when extracting a Zip Bomb. If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. The yauzl library does not contain any mechanism to detect or prevent extraction of a Zip Bomb https://en.wikipedia.org/wiki/Zip_bomb . Therefore, when using the User Import functionality with a Zip Bomb, PeerTube will try extracting the archive which will cause a disk space resource exhaustion.
Title PeerTube User Import Authenticated Resource Exhaustion
Weaknesses CWE-409
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2025-04-15T15:18:02.548Z

Reserved: 2025-04-14T21:02:31.674Z

Link: CVE-2025-32949

cve-icon Vulnrichment

Updated: 2025-04-15T15:17:41.887Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-15T15:16:09.607

Modified: 2025-10-21T16:25:07.737

Link: CVE-2025-32949

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.