Description
If an unauthenticated user sends a large amount of data to the Stork UI, it may cause memory and disk use problems for the system running the Stork server.
This issue affects Stork versions 1.0.0 through 2.3.0.
Published: 2025-09-10
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to the patched release most closely related to your current version of Stork: 2.2.1 or 2.3.1.


Vendor Workaround

Placing the Stork server behind a firewall or proxy that only allows access from trusted clients, and/or enforces input size limits, is an effective workaround.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-27598 If an unauthenticated user sends a large amount of data to the Stork UI, it may cause memory and disk use problems for the system running the Stork server. This issue affects Stork versions 1.0.0 through 2.3.0.
History

Tue, 04 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Thu, 11 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 11 Sep 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Isc
Isc stork
Vendors & Products Isc
Isc stork

Thu, 11 Sep 2025 00:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 10 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Description If an unauthenticated user sends a large amount of data to the Stork UI, it may cause memory and disk use problems for the system running the Stork server. This issue affects Stork versions 1.0.0 through 2.3.0.
Title DoS attack against the Stork UI from an unauthenticated user
Weaknesses CWE-779
CWE-789
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: isc

Published:

Updated: 2025-11-04T21:15:10.942Z

Reserved: 2025-08-07T09:49:55.542Z

Link: CVE-2025-8696

cve-icon Vulnrichment

Updated: 2025-11-04T21:15:10.942Z

cve-icon NVD

Status : Deferred

Published: 2025-09-10T18:15:34.817

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8696

cve-icon Redhat

Severity : Important

Publid Date: 2025-09-10T17:59:52Z

Links: CVE-2025-8696 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-09-11T10:42:41Z

Weaknesses