// For flags

CVE-2025-5115

MadeYouReset HTTP/2 vulnerability

Severity Score

7.7
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

In Eclipse Jetty, versions <=9.4.57, <=10.0.25, <=11.0.25, <=12.0.21, <=12.1.0.alpha2, an HTTP/2 client may trigger the server to send RST_STREAM frames, for example by sending frames that are malformed or that should not be sent in a particular stream state, therefore forcing the server to consume resources such as CPU and memory. For example, a client can open a stream and then send WINDOW_UPDATE frames with window size increment of 0, which is illegal.
Per specification https://www.rfc-editor.org/rfc/rfc9113.html#name-window_update , the server should send a RST_STREAM frame.
The client can now open another stream and send another bad WINDOW_UPDATE, therefore causing the server to consume more resources than necessary, as this case does not exceed the max number of concurrent streams, yet the client is able to create an enormous amount of streams in a short period of time. The attack can be performed with other conditions (for example, a DATA frame for a closed stream) that cause the server to send a RST_STREAM frame. Links: * https://github.com/jetty/jetty.project/security/advisories/GHSA-mmxm-8w33-wc4h

In Eclipse Jetty, versions <=9.4.57, <=10.0.25, <=11.0.25, <=12.0.21, <=12.1.0.alpha2, an HTTP/2 client may trigger the server to send RST_STREAM frames, for example by sending frames that are malformed or that should not be sent in a particular stream state, therefore forcing the server to consume resources such as CPU and memory. For example, a client can open a stream and then send WINDOW_UPDATE frames with window size increment of 0, which is illegal. Per specification https://www.rfc-editor.org/rfc/rfc9113.html#name-window_update , the server should send a RST_STREAM frame. The client can now open another stream and send another bad WINDOW_UPDATE, therefore causing the server to consume more resources than necessary, as this case does not exceed the max number of concurrent streams, yet the client is able to create an enormous amount of streams in a short period of time. The attack can be performed with other conditions (for example, a DATA frame for a closed stream) that cause the server to send a RST_STREAM frame. Links: * https://github.com/jetty/jetty.project/security/advisories/GHSA-mmxm-8w33-wc4h

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
None
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-05-23 CVE Reserved
  • 2025-08-20 CVE Published
  • 2025-08-21 CVE Updated
  • 2025-08-26 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Eclipse Jetty
Search vendor "Eclipse Jetty"
Eclipse Jetty
Search vendor "Eclipse Jetty" for product "Eclipse Jetty"
>= 9.4.57 <= >=9.3.0
Search vendor "Eclipse Jetty" for product "Eclipse Jetty" and version " >= 9.4.57 <= >=9.3.0"
en
Affected
Eclipse Jetty
Search vendor "Eclipse Jetty"
Eclipse Jetty
Search vendor "Eclipse Jetty" for product "Eclipse Jetty"
>= 10.0.25 <= >=10.0.0
Search vendor "Eclipse Jetty" for product "Eclipse Jetty" and version " >= 10.0.25 <= >=10.0.0"
en
Affected
Eclipse Jetty
Search vendor "Eclipse Jetty"
Eclipse Jetty
Search vendor "Eclipse Jetty" for product "Eclipse Jetty"
>= 11.0.25 <= >=11.0.0
Search vendor "Eclipse Jetty" for product "Eclipse Jetty" and version " >= 11.0.25 <= >=11.0.0"
en
Affected
Eclipse Jetty
Search vendor "Eclipse Jetty"
Eclipse Jetty
Search vendor "Eclipse Jetty" for product "Eclipse Jetty"
>= 12.0.21 <= >=12.0.0
Search vendor "Eclipse Jetty" for product "Eclipse Jetty" and version " >= 12.0.21 <= >=12.0.0"
en
Affected
Eclipse Jetty
Search vendor "Eclipse Jetty"
Eclipse Jetty
Search vendor "Eclipse Jetty" for product "Eclipse Jetty"
>= 12.1.0.alpha2 <= >=12.1.0.alpha0
Search vendor "Eclipse Jetty" for product "Eclipse Jetty" and version " >= 12.1.0.alpha2 <= >=12.1.0.alpha0"
en
Affected