Vulnerability DatabaseGHSA-vc29-vg52-6643

GHSA-vc29-vg52-6643
C# vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2025-27513) was discovered in OpenTelemetry.Api package versions 1.10.0 to 1.11.1, which could cause a Denial of Service (DoS) when processing tracestate and traceparent headers. This vulnerability affects OpenTelemetry .NET Automatic Instrumentation versions 1.10.0-beta.1 and 1.10.0. The issue was disclosed on March 6, 2025, and has been assigned a high severity rating with a CVSS score of 7.5 (GitHub Advisory).

Technical details

The vulnerability is triggered when processing HTTP requests containing tracestate and traceparent headers, causing excessive CPU usage even in applications that don't explicitly use trace context propagation. The issue has been classified with CWE-770 (Allocation of Resources Without Limits or Throttling). The vulnerability is characterized by network attack vector, low attack complexity, no privileges required, and no user interaction needed, as indicated by the CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (GitHub Advisory, NVD).

Impact

The vulnerability affects any application accessible over the web or backend services that process HTTP requests containing a tracestate header. When exploited, applications may experience excessive resource consumption, leading to increased latency, degraded performance, or complete downtime (GitHub Advisory).

Mitigation and workarounds

The issue has been resolved in OpenTelemetry.Api 1.11.2 by reverting the change that introduced the problematic behavior. OpenTelemetry .NET Automatic Instrumentation fixes it in version 1.11.0. To prevent accidental usage, the affected versions (1.10.0 to 1.11.1) have been delisted from NuGet. Users are advised to upgrade to the patched versions immediately (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64095CRITICAL9.8
  • C#C#
  • DNN.PLATFORM
NoYesOct 28, 2025
CVE-2025-62594MEDIUM5.5
  • C#C#
  • Magick.NET-Q8-OpenMP-x64
NoYesOct 27, 2025
CVE-2025-64094MEDIUM5.4
  • C#C#
  • DotNetNuke.Core
NoYesOct 28, 2025
CVE-2025-65955MEDIUM4.9
  • C#C#
  • ImageMagick-perl
NoYesDec 02, 2025
CVE-2025-62802MEDIUM4.3
  • C#C#
  • Dnn.Platform
NoYesOct 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management