Vulnerability Description
A bug in POST request handling causes a crash under a certain condition. This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12. Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the issue. A workaround for older versions is to set proxy.config.http.request_buffer_enabled to 0 (the default value is 0).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Traffic Server | >= 9.0.0, < 9.2.13 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/2s11roxlv1j8ph6q52rqo1klvl01n14qMailing ListVendor Advisory
FAQ
What is CVE-2025-58136?
CVE-2025-58136 is a vulnerability with a CVSS score of 7.5 (HIGH). A bug in POST request handling causes a crash under a certain condition. This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12. Users are recommended to upg...
How severe is CVE-2025-58136?
CVE-2025-58136 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-58136?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Traffic Server.