Vulnerability Description
A vulnerability was found in oatpp Oat++ up to 1.3.1. It has been declared as critical. This vulnerability affects the function deserializeArray of the file src/oatpp/json/Deserializer.cpp. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oatpp | Oat\+\+ | <= 1.3.1 |
Related Weaknesses (CWE)
References
- https://github.com/oatpp/oatpp/issues/1037ExploitIssue Tracking
- https://github.com/user-attachments/files/19579448/oatpp_crash.txtExploit
- https://vuldb.com/?ctiid.313738Permissions RequiredVDB Entry
- https://vuldb.com/?id.313738Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.597453Third Party AdvisoryVDB Entry
- https://github.com/oatpp/oatpp/issues/1037ExploitIssue Tracking
FAQ
What is CVE-2025-6566?
CVE-2025-6566 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability was found in oatpp Oat++ up to 1.3.1. It has been declared as critical. This vulnerability affects the function deserializeArray of the file src/oatpp/json/Deserializer.cpp. The manipu...
How severe is CVE-2025-6566?
CVE-2025-6566 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-6566?
Check the references section above for vendor advisories and patch information. Affected products include: Oatpp Oat\+\+.