Sinatra is a domain-specific language for creating web applications in Ruby. In versions prior to 4.2.0, there is a denial of service vulnerability in the `If-Match` and `If-None-Match` header parsing component of Sinatra, if the `etag` method is used when constructing the response. Carefully crafted input can cause `If-Match` and `If-None-Match` header parsing in Sinatra to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically involved in generating the `ETag` header value. Any applications that use the `etag` method when generating a response are impacted. Version 4.2.0 fixes the issue.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mr3q-g2mv-mr4q Sinatra is vulnerable to ReDoS through ETag header value generation
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 31 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sinatrarb:sinatra:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Tue, 21 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Sinatrarb
Sinatrarb sinatra
Vendors & Products Sinatrarb
Sinatrarb sinatra

Fri, 17 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Moderate


Fri, 10 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Oct 2025 19:45:00 +0000

Type Values Removed Values Added
Description Sinatra is a domain-specific language for creating web applications in Ruby. In versions prior to 4.2.0, there is a denial of service vulnerability in the `If-Match` and `If-None-Match` header parsing component of Sinatra, if the `etag` method is used when constructing the response. Carefully crafted input can cause `If-Match` and `If-None-Match` header parsing in Sinatra to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically involved in generating the `ETag` header value. Any applications that use the `etag` method when generating a response are impacted. Version 4.2.0 fixes the issue.
Title Sinatra has ReDoS vulnerability in ETag header value generation
Weaknesses CWE-1333
References
Metrics cvssV4_0

{'score': 2.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-10-10T20:54:47.627Z

Reserved: 2025-10-03T22:21:59.615Z

Link: CVE-2025-61921

cve-icon Vulnrichment

Updated: 2025-10-10T20:54:28.101Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-10T20:15:38.067

Modified: 2025-10-31T16:27:16.573

Link: CVE-2025-61921

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-10-10T19:28:10Z

Links: CVE-2025-61921 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-10-21T13:14:08Z