Impact
The vulnerability exists in the image handling component of the Open Source Social Network, where a specially crafted image file with extremely large pixel dimensions can trigger the server to allocate excessive memory and CPU resources during decompression and resizing. The resulting denial of service can affect the availability of the application and any users interacting with it. This weakness is a classic uncontrolled resource consumption problem (CWE‑400) coupled with the allocation of resources without limits (CWE‑770).
Affected Systems
Users running Open Source Social Network versions earlier than 9.0 are affected, regardless of the environment, as the unpatched image processing routine is invoked during normal upload workflows. The vendor is Opensource‑Socialnetwork, and the product name is Open Source Social Network.
Risk and Exploitability
With a CVSS score of 8.2, the vulnerability is considered high severity, and the EPSS score of less than 1% indicates that while exploitation is technically feasible, it is unlikely to be widely automated at this time. The vulnerability is not listed in the CISA KEV catalog, which suggests no widespread, documented exploitation yet. An attacker can exploit it by uploading a malicious image through the web interface, and the attack requires only the ability to submit a file—no special privileges are needed on the target server.
OpenCVE Enrichment