CVE-2025-6375

A vulnerability was found in poco up to 1.14.1. It has been rated as problematic. Affected by this issue is the function MultipartInputStream of the file Net/src/MultipartReader.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.14.2 is able to address this issue. The patch is identified as 6f2f85913c191ab9ddfb8fae781f5d66afccf3bf. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pocoproject:poco:*:*:*:*:*:*:*:*

History

18 Sep 2025, 13:38

Type Values Removed Values Added
First Time Pocoproject
Pocoproject poco
CPE cpe:2.3:a:pocoproject:poco:*:*:*:*:*:*:*:*
References () https://github.com/pocoproject/poco/commit/6f2f85913c191ab9ddfb8fae781f5d66afccf3bf - () https://github.com/pocoproject/poco/commit/6f2f85913c191ab9ddfb8fae781f5d66afccf3bf - Patch
References () https://github.com/pocoproject/poco/issues/4915 - () https://github.com/pocoproject/poco/issues/4915 - Exploit, Issue Tracking, Patch
References () https://github.com/pocoproject/poco/releases/tag/poco-1.14.2-release - () https://github.com/pocoproject/poco/releases/tag/poco-1.14.2-release - Release Notes
References () https://github.com/user-attachments/files/19524599/poco_crash.txt - () https://github.com/user-attachments/files/19524599/poco_crash.txt - Exploit
References () https://vuldb.com/?ctiid.313370 - () https://vuldb.com/?ctiid.313370 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.313370 - () https://vuldb.com/?id.313370 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.597446 - () https://vuldb.com/?submit.597446 - Third Party Advisory, VDB Entry

23 Jun 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en poco hasta la versión 1.14.1. Se ha clasificado como problemática. Este problema afecta a la función MultipartInputStream del archivo Net/src/MultipartReader.cpp. La manipulación provoca la desreferenciación de puntero nulo. El ataque debe abordarse localmente. Se ha hecho público el exploit y puede que sea utilizado. Actualizar a la versión 1.14.2 puede solucionar este problema. El parche se identifica como 6f2f85913c191ab9ddfb8fae781f5d66afccf3bf. Se recomienda actualizar el componente afectado.
References () https://github.com/pocoproject/poco/issues/4915 - () https://github.com/pocoproject/poco/issues/4915 -

21 Jun 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-21 01:15

Updated : 2025-09-18 13:38


NVD link : CVE-2025-6375

Mitre link : CVE-2025-6375

CVE.ORG link : CVE-2025-6375


JSON object : View

Products Affected

pocoproject

  • poco
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference