Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7057 | A Denial of Service (DoS) vulnerability was discovered in the /api/v1/boards/{board_id} endpoint of invoke-ai/invokeai version v5.0.2. This vulnerability occurs when an excessively large payload is sent in the board_name field during a PATCH request. By sending a large payload, the UI becomes unresponsive, rendering it impossible for users to interact with or manage the affected board. Additionally, the option to delete the board becomes inaccessible, amplifying the severity of the issue. |
Github GHSA |
GHSA-ffh5-w482-c7m5 | InvokeAI Uncontrolled Resource Consumption vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 20 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Denial of Service (DoS) vulnerability was discovered in the /api/v1/boards/{board_id} endpoint of invoke-ai/invokeai version v5.0.2. This vulnerability occurs when an excessively large payload is sent in the board_name field during a PATCH request. By sending a large payload, the UI becomes unresponsive, rendering it impossible for users to interact with or manage the affected board. Additionally, the option to delete the board becomes inaccessible, amplifying the severity of the issue. | |
| Title | Denial of Service (DoS) via Large Payload in Board Name Field in invoke-ai/invokeai | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-03-20T13:32:48.412Z
Reserved: 2024-11-09T06:12:15.499Z
Link: CVE-2024-11043
Updated: 2025-03-20T13:32:38.060Z
Status : Received
Published: 2025-03-20T10:15:23.647
Modified: 2025-03-20T14:15:17.980
Link: CVE-2024-11043
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA