Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-58136
PUBLISHED
More InfoOfficial Page
Assigner-apache
Assigner Org ID-f0158376-9dc2-43b6-827c-5f631a4d8d09
View Known Exploited Vulnerability (KEV) details
Published At-02 Apr, 2026 | 15:54
Updated At-02 Apr, 2026 | 18:13
Rejected At-
▼CVE Numbering Authority (CNA)
Apache Traffic Server: A simple legitimate POST request causes a crash

A bug in POST request handling causes a crash under a certain condition. This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12. Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the issue. A workaround for older versions is to set proxy.config.http.request_buffer_enabled to 0 (the default value is 0).

Affected Products
Vendor
The Apache Software FoundationApache Software Foundation
Product
Apache Traffic Server
Default Status
unaffected
Versions
Affected
  • From 10.0.0 through 10.1.1 (semver)
  • From 9.0.0 through 9.2.12 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-670CWE-670 Always-Incorrect Control Flow Implementation
Type: CWE
CWE ID: CWE-670
Description: CWE-670 Always-Incorrect Control Flow Implementation
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Textual description of severity
text:
moderate
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.apache.org/thread/2s11roxlv1j8ph6q52rqo1klvl01n14q
vendor-advisory
Hyperlink: https://lists.apache.org/thread/2s11roxlv1j8ph6q52rqo1klvl01n14q
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found