Vulnerability Details CVE-2025-59348
Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the processPieceFromSource method does not update the structure’s usedTraffic field, because an uninitialized variable n is used as a guard to the AddTraffic method call, instead of the result.Size variable. A task is processed by a peer. The usedTraffic metadata is not updated during the processing. Rate limiting is incorrectly applied, leading to a denial-of-service condition for the peer. This vulnerability is fixed in 2.1.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 12.2%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2025-59348
-
cpe:2.3:a:linuxfoundation:dragonfly:-
-
cpe:2.3:a:linuxfoundation:dragonfly:0.1.0
-
cpe:2.3:a:linuxfoundation:dragonfly:0.2.0
-
cpe:2.3:a:linuxfoundation:dragonfly:0.3.0
-
cpe:2.3:a:linuxfoundation:dragonfly:0.4.0
-
cpe:2.3:a:linuxfoundation:dragonfly:0.5.0
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.0
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.1
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.10
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.2
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.3
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.4
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.5
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.6
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.7
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.8
-
cpe:2.3:a:linuxfoundation:dragonfly:2.0.9