First published: Fri Apr 18 2025(Updated: )
NamelessMC is a free, easy to use & powerful website software for Minecraft servers. In version 2.1.4 and prior, the s parameter in GET requests for forum search functionality lacks length validation, allowing attackers to submit excessively long search queries. This oversight can lead to performance degradation and potential denial-of-service (DoS) attacks. This issue has been patched in version 2.2.0.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
NamelessMC | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-29784 is classified as a medium-severity vulnerability due to its potential impact on application stability.
To fix CVE-2025-29784, upgrade to NamelessMC version 2.2.0 or later which includes the necessary validation checks.
CVE-2025-29784 is a denial-of-service vulnerability due to improper input validation in search queries.
NamelessMC versions 2.1.4 and earlier are affected by CVE-2025-29784.
Yes, CVE-2025-29784 can be exploited remotely via crafted GET requests to the forum search functionality.