Vulnerability Details CVE-2025-49763
ESI plugin does not have the limit for maximum inclusion depth, and that allows excessive memory consumption if malicious instructions are inserted.
Users can use a new setting for the plugin (--max-inclusion-depth) to limit it.
This issue affects Apache Traffic Server: from 10.0.0 through 10.0.5, from 9.0.0 through 9.2.10.
Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 16.4%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2025-49763
-
cpe:2.3:a:apache:traffic_server:10.0.0
-
cpe:2.3:a:apache:traffic_server:10.0.1
-
cpe:2.3:a:apache:traffic_server:10.0.2
-
cpe:2.3:a:apache:traffic_server:10.0.3
-
cpe:2.3:a:apache:traffic_server:10.0.4
-
cpe:2.3:a:apache:traffic_server:10.0.5
-
cpe:2.3:a:apache:traffic_server:9.0.0
-
cpe:2.3:a:apache:traffic_server:9.0.1
-
cpe:2.3:a:apache:traffic_server:9.0.2
-
cpe:2.3:a:apache:traffic_server:9.1.0
-
cpe:2.3:a:apache:traffic_server:9.1.1
-
cpe:2.3:a:apache:traffic_server:9.1.2
-
cpe:2.3:a:apache:traffic_server:9.1.3
-
cpe:2.3:a:apache:traffic_server:9.1.4
-
cpe:2.3:a:apache:traffic_server:9.2.0
-
cpe:2.3:a:apache:traffic_server:9.2.1
-
cpe:2.3:a:apache:traffic_server:9.2.10
-
cpe:2.3:a:apache:traffic_server:9.2.2
-
cpe:2.3:a:apache:traffic_server:9.2.3
-
cpe:2.3:a:apache:traffic_server:9.2.4
-
cpe:2.3:a:apache:traffic_server:9.2.5
-
cpe:2.3:a:apache:traffic_server:9.2.6
-
cpe:2.3:a:apache:traffic_server:9.2.7
-
cpe:2.3:a:apache:traffic_server:9.2.8
-
cpe:2.3:a:apache:traffic_server:9.2.9