mayswind ezbookkeeping versions 1.2.0 and earlier contain a critical vulnerability in JSON and XML file import processing. The application fails to validate nesting depth during parsing operations, allowing authenticated attackers to trigger denial of service conditions by uploading deeply nested malicious files. This results in CPU exhaustion, service degradation, or complete service unavailability.
History

Wed, 18 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-674
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description mayswind ezbookkeeping versions 1.2.0 and earlier contain a critical vulnerability in JSON and XML file import processing. The application fails to validate nesting depth during parsing operations, allowing authenticated attackers to trigger denial of service conditions by uploading deeply nested malicious files. This results in CPU exhaustion, service degradation, or complete service unavailability.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-18T16:24:14.857Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65519

cve-icon Vulnrichment

Updated: 2026-02-18T16:19:20.255Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-18T16:22:28.977

Modified: 2026-02-18T17:51:53.510

Link: CVE-2025-65519

cve-icon Redhat

No data.