CVE-2025-0190
Published: 20 March 2025
Summary
CVE-2025-0190 is a high-severity Excessive Data Query Operations in a Large Data Table (CWE-1049) vulnerability in Aimstack Aim. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application Exhaustion Flood (T1499.003); ranked in the top 36.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as Other Platforms; in the Other ATLAS/OWASP Terms risk domain.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SC-6 (Resource Availability).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Implements denial-of-service protections at web API entry points to block resource exhaustion from simultaneous large Text object queries.
Protects system resources like processing cycles and memory from unauthorized consumption caused by large-scale API queries overwhelming the Aim web server.
Validates web API inputs to limit query size, number of Text objects, or request volume, mitigating the trigger for server unresponsiveness.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables endpoint denial of service by overwhelming the Aim web server with simultaneous queries on a large number of Text objects, causing resource exhaustion and prolonged unresponsiveness to other requests.
NVD Description
In version 3.25.0 of aimhubio/aim, a denial of service vulnerability exists. By tracking a large number of `Text` objects and then querying them simultaneously through the web API, the Aim web server becomes unresponsive to other requests for an extended…
more
period while processing and returning these objects. This vulnerability can be exploited repeatedly, leading to a complete denial of service.
Deeper analysisAI
CVE-2025-0190 is a denial of service vulnerability affecting version 3.25.0 of aimhubio/aim. The flaw occurs when a large number of Text objects are tracked and then queried simultaneously through the web API, causing the Aim web server to become unresponsive to other requests for an extended period while processing and returning these objects. It is rated with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-1049 and NVD-CWE-Other.
The vulnerability can be exploited by any unauthenticated attacker with network access to the Aim web server, requiring low complexity and no user interaction. By repeatedly tracking large volumes of Text objects and issuing simultaneous queries via the web API, an attacker can render the server unresponsive, leading to a complete denial of service.
Mitigation details and additional information are available in the advisory published on Huntr at https://huntr.com/bounties/38d151f1-abb4-443a-86b0-6c26f0c6cb70.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other Platforms
- Risk Domain
- Other ATLAS/OWASP Terms
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Aim (aimhubio/aim) is an open-source ML experiment tracking platform used for logging and visualizing AI/ML experiments, including Text objects, fitting 'Other Platforms' as it is neither a framework, library, nor specialized in NLP/CV/etc., but a tool for AI/ML workflows. Vulnerability confirmed AI-related via AI/ML bug bounty context.