PT-2025-44569 · Scrapy+2 · Scrapy+2
Published
2025-06-14
·
Updated
2026-02-19
·
CVE-2025-6176
CVSS v2.0
7.8
High
| AV:N/AC:L/Au:N/C:N/I:N/A:C |
Name of the Vulnerable Software and Affected Versions
Scrapy versions up to 2.13.2
Description
Scrapy is susceptible to a denial of service (DoS) attack stemming from an issue in its brotli decompression implementation. The built-in protection against decompression bombs does not effectively address the brotli variant, potentially causing client crashes with as little as 80GB of available memory. This is due to brotli's ability to achieve very high compression ratios with zero-filled data, resulting in substantial memory usage during decompression.
Recommendations
Versions prior to 2.13.2 are affected.
Fix
DoS
Resource Exhaustion
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Debian
Rocky Linux
Scrapy