Vulnerability DatabaseGHSA-58j9-j2fj-v8f4

GHSA-58j9-j2fj-v8f4
Rust vulnerability analysis and mitigation

Overview

SurrealDB versions prior to 1.1.0 contain a high-severity vulnerability (GHSA-58j9-j2fj-v8f4) in its WebSocket interface. The vulnerability stems from the dependency on tungstenite and tokio-tungstenite crates used by the axum crate for handling WebSocket connections. The issue was discovered and disclosed in January 2024, affecting the HTTP header parsing during client handshake, which could lead to continuous high CPU consumption when processing very long headers (GitHub Advisory).

Technical details

The vulnerability exists in the tungstenite crate versions before 0.20.1, where the parsing of HTTP headers during the client handshake could continuously consume high CPU when processing exceptionally long headers. The issue affects both the frequency of parse attempts (thousands of times) and the volume of data processed in each attempt (millions of bytes). The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating network accessibility with no required privileges or user interaction (NIST NVD, RustSec).

Impact

A remote unauthenticated attacker can cause a SurrealDB server exposing its WebSocket interface to consume high CPU resources by sending an HTTP request with a very long header to the WebSocket interface. This can potentially lead to a denial of service condition, affecting the server's availability and performance (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to SurrealDB version 1.1.0 or later, which includes the patched version of the tungstenite crate. For users unable to update immediately, alternative workarounds include limiting access to the WebSocket interface via a reverse proxy if it's not in use or only used by trusted clients. Additionally, implementing a reverse proxy to strip or truncate request headers exceeding a reasonable length before reaching the SurrealDB server can help mitigate the vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68705HIGH8.8
  • RustRust
  • rustfs
NoYesJan 07, 2026
CVE-2025-69255MEDIUM5.5
  • RustRust
  • rustfs
NoYesJan 07, 2026
GHSA-rhfx-m35p-ff5jLOW2.7
  • RustRust
  • lru
NoYesJan 07, 2026
GHSA-9c48-w39g-hm26LOW2.7
  • RustRust
  • rsa
NoYesJan 06, 2026
RUSTSEC-2026-0002N/AN/A
  • RustRust
  • lru
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management