Impact
The CSP report endpoint in MISP was intended to accept and log only 1‑KB CSP reports but incorrectly allowed up to 1‑MB reports before truncation. This mis‑limit means that anyone who can reach the endpoint can use large reports to generate excessive log volume, rapidly exhausting storage and degrading log processing. The result is a denial of service caused by uncontrolled log growth.
Affected Systems
The vulnerability affects the MISP platform. No specific affected versions are listed, so any deployment that has the CSP report endpoint exposed to untrusted clients is potentially vulnerable. The required information for an exact version is not provided in the data.
Risk and Exploitability
The CVSS score of 5.1 indicates a moderate risk level, but the lack of an EPSS score means the exploitation likelihood is unknown. The entry is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves unauthenticated HTTP requests directed at the publicly or internally accessible CSP report endpoint. By submitting large CSP reports it yields uncontrolled resource consumption, inflating log size and potentially exhausting disk space or slowing system operations.
OpenCVE Enrichment