This issue affects Stork versions 1.0.0 through 2.3.0.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27598 | If an unauthenticated user sends a large amount of data to the Stork UI, it may cause memory and disk use problems for the system running the Stork server. This issue affects Stork versions 1.0.0 through 2.3.0. |
Solution
Upgrade to the patched release most closely related to your current version of Stork: 2.2.1 or 2.3.1.
Workaround
Placing the Stork server behind a firewall or proxy that only allows access from trusted clients, and/or enforces input size limits, is an effective workaround.
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 11 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Sep 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Isc
Isc stork |
|
| Vendors & Products |
Isc
Isc stork |
Thu, 11 Sep 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 10 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If an unauthenticated user sends a large amount of data to the Stork UI, it may cause memory and disk use problems for the system running the Stork server. This issue affects Stork versions 1.0.0 through 2.3.0. | |
| Title | DoS attack against the Stork UI from an unauthenticated user | |
| Weaknesses | CWE-779 CWE-789 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: isc
Published:
Updated: 2025-11-04T21:15:10.942Z
Reserved: 2025-08-07T09:49:55.542Z
Link: CVE-2025-8696
Updated: 2025-11-04T21:15:10.942Z
Status : Awaiting Analysis
Published: 2025-09-10T18:15:34.817
Modified: 2025-11-04T22:16:45.083
Link: CVE-2025-8696
OpenCVE Enrichment
Updated: 2025-09-11T10:42:41Z
EUVD