CVE-2026-25667 Affecting dotnet-8-runtime package, versions <8.0.119-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
2.41% (86th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-MINIMOSLATEST-DOTNET8RUNTIME-16088389
  • published16 Apr 2026
  • disclosed19 Mar 2026

Introduced: 19 Mar 2026

NewCVE-2026-25667  (opens in a new tab)

How to fix?

Upgrade Minimos:latest dotnet-8-runtime to version 8.0.119-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream dotnet-8-runtime package and not the dotnet-8-runtime package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

ASP.NET Core Kestrel in Microsoft .NET 8.0 before 8.0.22 and .NET 9.0 before 9.0.11 allows a remote attacker to cause excessive CPU consumption by sending a crafted QUIC packet, because of an incorrect exit condition for HTTP/3 Encoder/Decoder stream processing.