Cyber Posture

CVE-2025-0190

HighPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
28 March 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0044 63.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0190 is a high-severity Excessive Data Query Operations in a Large Data Table (CWE-1049) vulnerability in Aimstack Aim. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application Exhaustion Flood (T1499.003); ranked in the top 36.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Other Platforms; in the Other ATLAS/OWASP Terms risk domain.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SC-6 (Resource Availability).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application Exhaustion Flood (T1499.003) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Implements denial-of-service protections at web API entry points to block resource exhaustion from simultaneous large Text object queries.

prevent

Protects system resources like processing cycles and memory from unauthorized consumption caused by large-scale API queries overwhelming the Aim web server.

prevent

Validates web API inputs to limit query size, number of Text objects, or request volume, mitigating the trigger for server unresponsiveness.

MITRE ATT&CK Enterprise TechniquesAI

T1499.003 Application Exhaustion Flood Impact
Adversaries may target resource intensive features of applications to cause a denial of service (DoS), denying availability to those applications.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The vulnerability enables endpoint denial of service by overwhelming the Aim web server with simultaneous queries on a large number of Text objects, causing resource exhaustion and prolonged unresponsiveness to other requests.

NVD Description

In version 3.25.0 of aimhubio/aim, a denial of service vulnerability exists. By tracking a large number of `Text` objects and then querying them simultaneously through the web API, the Aim web server becomes unresponsive to other requests for an extended…

more

period while processing and returning these objects. This vulnerability can be exploited repeatedly, leading to a complete denial of service.

Deeper analysisAI

CVE-2025-0190 is a denial of service vulnerability affecting version 3.25.0 of aimhubio/aim. The flaw occurs when a large number of Text objects are tracked and then queried simultaneously through the web API, causing the Aim web server to become unresponsive to other requests for an extended period while processing and returning these objects. It is rated with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-1049 and NVD-CWE-Other.

The vulnerability can be exploited by any unauthenticated attacker with network access to the Aim web server, requiring low complexity and no user interaction. By repeatedly tracking large volumes of Text objects and issuing simultaneous queries via the web API, an attacker can render the server unresponsive, leading to a complete denial of service.

Mitigation details and additional information are available in the advisory published on Huntr at https://huntr.com/bounties/38d151f1-abb4-443a-86b0-6c26f0c6cb70.

Details

CWE(s)

Affected Products

aimstack
aim
3.25.0

AI Security AnalysisAI

AI Category
Other Platforms
Risk Domain
Other ATLAS/OWASP Terms
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Aim (aimhubio/aim) is an open-source ML experiment tracking platform used for logging and visualizing AI/ML experiments, including Text objects, fitting 'Other Platforms' as it is neither a framework, library, nor specialized in NLP/CV/etc., but a tool for AI/ML workflows. Vulnerability confirmed AI-related via AI/ML bug bounty context.

CVEs Like This One

CVE-2025-0189Same product: Aimstack Aim
CVE-2024-8238Same product: Aimstack Aim
CVE-2024-7760Same product: Aimstack Aim
CVE-2024-8769Same product: Aimstack Aim
CVE-2025-51464Same product: Aimstack Aim

References