Impact
Key detail from CVE description: The handle_trailers function in ewe versions 0.8.0 through 3.0.4 loops indefinitely when parsing rejected trailer headers, causing the BEAM process to consume 100% CPU and remain unresponsive. This is a logical control flaw (CWE-825) that results in a denial of service. The vulnerability is exploitable by any unauthenticated remote client before application code runs, preventing normal request handling and making application-level mitigations ineffective.
Affected Systems
The affected product is the vshakitskiy:ewe Gleam web server. Versions 0.8.0 through 3.0.4 are vulnerable. Any deployment that calls ewe.read_body on chunked requests will exercise the buggy code path.
Risk and Exploitability
The CVSS score is 7.5, indicating high severity. No EPSS data is available, and the issue is not listed in CISA's KEV catalog. Exploitability requires an unauthenticated client to send a request containing forbidden or undeclared trailer headers in a chunked payload. Once triggered, the process enters a permanent loop with no timeout, leading to a lasting denial of service. Because the attack can occur before the application code is reached, a workaround at the application layer is not possible.
OpenCVE Enrichment
Github GHSA