CVE-2025-6203 Affecting splunk-otel-collector-fips package, versions <0.132.0-r1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-SPLUNKOTELCOLLECTORFIPS-12253170
  • published30 Aug 2025
  • disclosed28 Aug 2025

Introduced: 28 Aug 2025

CVE-2025-6203  (opens in a new tab)

How to fix?

Upgrade Chainguard splunk-otel-collector-fips to version 0.132.0-r1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream splunk-otel-collector-fips package and not the splunk-otel-collector-fips package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.

CVSS Base Scores

version 3.1