Impact
This vulnerability manifests as an unhandled CookieError exception when the Emmett framework parses a malformed Cookie header. The resulting 500 Internal Server Error is returned to the client, continuously exhausting server resources and effectively denying service. The flaw is due to improper exception handling in the request wrapper, which is classified as CWE-248 and CWE-307.
Affected Systems
The issued product is Emmett framework core, with all installations running a version older than 1.3.11 affected. The issue is not tied to any authenticated context, meaning any external user can exploit it by sending a crafted HTTP request containing invalid cookies.
Risk and Exploitability
With a CVSS score of 7.5, the exploit has high severity. The EPSS score indicates that active exploitation is expected to be low, and it is not currently listed in the CISA KEV catalog. The attack vector inferred from the description is remote, as the vulnerability is triggered by external HTTP traffic that submits malformed cookies. Since no authentication or privileged access is required, the exposure is broad.
OpenCVE Enrichment
Github GHSA