Cyber Posture

CVE-2025-63649

HighPublic PoC

Published: 29 January 2026

Published
29 January 2026
Modified
19 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0002 6.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-63649 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Monkey-Project Monkey. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Out-of-bounds read in public-facing Monkey HTTP server parser directly enables remote unauthenticated exploitation (T1190) leading to application crash/DoS via crafted requests (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_parser.c) of monkey commit f37e984 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the server.

Deeper analysisAI

CVE-2025-63649 is an out-of-bounds read vulnerability in the http_parser_transfer_encoding_chunked function located in mk_server/mk_http_parser.c of the Monkey HTTP server at commit f37e984. This flaw affects deployments of Monkey, a lightweight open-source web server, where the parser mishandles chunked transfer encoding in HTTP requests, leading to potential memory access errors.

Remote attackers can exploit this vulnerability without authentication by sending a specially crafted POST request to a vulnerable Monkey server instance. The CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) indicates high severity due to its network accessibility, low attack complexity, and ability to cause a full Denial of Service (DoS) by crashing the server process, rendering the service unavailable.

Mitigation details and patches are documented in related advisories, including the Archer Security advisory at https://github.com/archersec/security-advisories/blob/master/monkey/monkey-advisory-2025.md and the Monkey project issue tracker at https://github.com/monkey/monkey/issues/426, which security practitioners should consult for upgrade instructions or workarounds. The vulnerability is associated with CWE-125 (Out-of-bounds Read).

Details

CWE(s)

Affected Products

monkey-project
monkey
≤ 1.8.5

CVEs Like This One

CVE-2025-63657Same product: Monkey-Project Monkey
CVE-2025-63650Same product: Monkey-Project Monkey
CVE-2025-63656Same product: Monkey-Project Monkey
CVE-2025-63653Same product: Monkey-Project Monkey
CVE-2025-63655Same product: Monkey-Project Monkey
CVE-2025-63658Same product: Monkey-Project Monkey
CVE-2025-63652Same product: Monkey-Project Monkey
CVE-2025-63651Same product: Monkey-Project Monkey
CVE-2026-3622Shared CWE-125
CVE-2026-32319Shared CWE-125

References