Description
zae-limiter is a rate limiting library using the token bucket algorithm. Prior to version 0.10.1, all rate limit buckets for a single entity share the same DynamoDB partition key (`namespace/ENTITY#{id}`). A high-traffic entity can exceed DynamoDB's per-partition throughput limits (~1,000 WCU/sec), causing throttling that degrades service for that entity — and potentially co-located entities in the same partition. Version 0.10.1 fixes the issue.
Published: 2026-02-25
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The suspicious scenario involves the Zae‑Limiter rate‑limiting library, which uses a token bucket algorithm keyed by a shared DynamoDB partition key. Prior to version 0.10.1, every entity that shares the same namespace uses the identical partition identifier (namespace/ENTITY#{id}). When a single high‑traffic entity writes beyond DynamoDB’s per‑partition limit of roughly 1,000 write capacity units per second, the table throttles the requests. The throttling propagates back into the rate limiter, causing increased latency or denied writes for that entity and, because all entities share the partition, for other entities that happen to reside in the same partition. The fundamental weakness is a resource‑exhaustion flaw (CWE‑770) that results in a denial‑of‑service condition.

Affected Systems

All releases of ZeroAE ZaE‑Limiter before 0.10.1—including 0.10.0 and earlier—are affected. The library is used in applications that implement request throttling against DynamoDB using a common partition key. The vulnerable component is identified by a CPE that matches ZeroAE ZaE‑Limiter.

Risk and Exploitability

The CVSS score of 4.3 deems the vulnerability medium severity. The EPSS score of less than 1% suggests an extremely low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog, indicating no known active attacks. An attacker would need to generate a sustained burst of traffic against a particular entity using the library to trigger DynamoDB throttling. The likely attack vector is application‑level traffic—either through compromised application credentials or legitimate users sending high request volumes—rather than a dedicated network‑exposed service.

Generated by OpenCVE AI on April 18, 2026 at 20:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Zae‑Limiter to version 0.10.1 or later so that each entity uses a unique DynamoDB partition key.
  • If an upgrade is not immediately feasible, modify the application so that each entity’s bucket hash points to a distinct partition key or move the buckets to separate DynamoDB tables; this breaks the hot‑partition and removes the denial‑of‑service path.
  • Configure DynamoDB metrics for write capacity usage and set alerts for throttling events to detect the problem early and respond before service degradation occurs.

Generated by OpenCVE AI on April 18, 2026 at 20:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-76rv-2r9v-c5m6 zae-limiter: DynamoDB hot partition throttling enables per-entity Denial of Service
History

Thu, 26 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:zeroae:zae-limiter:*:*:*:*:*:*:*:*

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Zeroae
Zeroae zae-limiter
Vendors & Products Zeroae
Zeroae zae-limiter

Wed, 25 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description zae-limiter is a rate limiting library using the token bucket algorithm. Prior to version 0.10.1, all rate limit buckets for a single entity share the same DynamoDB partition key (`namespace/ENTITY#{id}`). A high-traffic entity can exceed DynamoDB's per-partition throughput limits (~1,000 WCU/sec), causing throttling that degrades service for that entity — and potentially co-located entities in the same partition. Version 0.10.1 fixes the issue.
Title zae-limiter: DynamoDB hot partition throttling enables per-entity Denial of Service
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Zeroae Zae-limiter
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T21:33:41.329Z

Reserved: 2026-02-23T17:56:51.202Z

Link: CVE-2026-27695

cve-icon Vulnrichment

Updated: 2026-02-26T21:07:08.563Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T15:20:52.907

Modified: 2026-02-26T15:38:45.277

Link: CVE-2026-27695

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:45:05Z

Weaknesses