Integer Underflow (Wrap or Wraparound) Affecting libsoup package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (26th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-LIBSOUP-10247396
  • published26 May 2025
  • disclosed19 May 2025
  • creditUnknown

Introduced: 19 May 2025

NewCVE-2025-4948  (opens in a new tab)
CWE-191  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Integer Underflow (Wrap or Wraparound) due to an integer underflow in the soup_multipart_new_from_message function. An attacker can cause the application to access invalid memory and crash by sending specially crafted multipart messages.

Workaround

This vulnerability can be mitigated by avoiding the use of libsoup with untrusted or unauthenticated multipart HTTP message sources until updated packages are available. Administrators can deploy application-level filters or HTTP proxies that reject malformed multipart requests. It is strongly advised to apply vendor-supplied patches as soon as they are released to address this integer underflow vulnerability and restore the stability of affected services.

CVSS Base Scores

version 4.0
version 3.1