First published: Mon Feb 24 2025(Updated: )
The http parser in Phusion Passenger 6.0.21 through 6.0.25 before 6.0.26 allows a denial of service during parsing of a request with an invalid HTTP method.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/passenger | >=6.0.21<6.0.26 | 6.0.26 |
Phusion Passenger | >=6.0.21<6.0.26 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26803 is classified as a denial of service vulnerability.
To fix CVE-2025-26803, upgrade Phusion Passenger to version 6.0.26 or later.
Phusion Passenger versions 6.0.21 through 6.0.25 are affected by CVE-2025-26803.
Yes, CVE-2025-26803 can potentially be exploited remotely if the server processes a request with an invalid HTTP method.
CVE-2025-26803 can lead to a Denial of Service, causing the application to become unresponsive.