A vulnerability was found in oatpp Oat++ up to 1.3.1. It has been declared as critical. This vulnerability affects the function deserializeArray of the file src/oatpp/json/Deserializer.cpp. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/oatpp/oatpp/issues/1037 | Exploit Issue Tracking |
| https://github.com/user-attachments/files/19579448/oatpp_crash.txt | Exploit |
| https://vuldb.com/?ctiid.313738 | Permissions Required VDB Entry |
| https://vuldb.com/?id.313738 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.597453 | Third Party Advisory VDB Entry |
| https://github.com/oatpp/oatpp/issues/1037 | Exploit Issue Tracking |
Configurations
History
01 Oct 2025, 19:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/oatpp/oatpp/issues/1037 - Exploit, Issue Tracking | |
| References | () https://github.com/user-attachments/files/19579448/oatpp_crash.txt - Exploit | |
| References | () https://vuldb.com/?ctiid.313738 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.313738 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.597453 - Third Party Advisory, VDB Entry | |
| First Time |
Oatpp oat\+\+
Oatpp |
|
| CPE | cpe:2.3:a:oatpp:oat\+\+:*:*:*:*:*:*:*:* | |
| CWE | CWE-787 |
26 Jun 2025, 18:58
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
24 Jun 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/oatpp/oatpp/issues/1037 - |
24 Jun 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-24 13:15
Updated : 2025-10-01 19:45
NVD link : CVE-2025-6566
Mitre link : CVE-2025-6566
CVE.ORG link : CVE-2025-6566
JSON object : View
Products Affected
oatpp
- oat\+\+
