{"id":"CVE-2025-61921","summary":"Sinatra has ReDoS vulnerability in ETag header value generation","details":"Sinatra is a domain-specific language for creating web applications in Ruby. In versions prior to 4.2.0, there is a denial of service vulnerability in the `If-Match` and `If-None-Match` header parsing component of Sinatra, if the `etag` method is used when constructing the response. Carefully crafted input can cause `If-Match` and `If-None-Match` header parsing in Sinatra to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically involved in generating the `ETag` header value. Any applications that use the `etag` method when generating a response are impacted. Version 4.2.0 fixes the issue.","aliases":["GHSA-mr3q-g2mv-mr4q"],"modified":"2026-04-10T05:33:52.408630Z","published":"2025-10-10T19:28:10.688Z","related":["CGA-3vm9-x3m9-9c8f"],"database_specific":{"cwe_ids":["CWE-1333"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/61xxx/CVE-2025-61921.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://bugs.ruby-lang.org/issues/19104"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/61xxx/CVE-2025-61921.json"},{"type":"ADVISORY","url":"https://github.com/sinatra/sinatra/security/advisories/GHSA-mr3q-g2mv-mr4q"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61921"},{"type":"REPORT","url":"https://github.com/sinatra/sinatra/issues/2120"},{"type":"FIX","url":"https://github.com/sinatra/sinatra/pull/1823"},{"type":"FIX","url":"https://github.com/sinatra/sinatra/pull/2121"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sinatra/sinatra","events":[{"introduced":"0"},{"fixed":"f2ad45f7d2456172974a30d300e9f82424336e09"}]}],"versions":["0.0.1","0.1.0","0.1.5","0.1.6","0.1.7","0.2.0","0.2.2","0.3.0","0.3.1","0.3.2","0.3.3","0.9.0.1","0.9.0.2","0.9.1","0.9.1.1","0.9.2","1.0","1.0.a","1.0.b","1.1.0","1.1.a","1.1.b","1.2.0","1.2.0.a","1.2.0.b","1.2.0.c","1.2.0.d","1.2.1","1.3.0","1.3.1","1.3.2","1.4.0","1.4.1","1.4.2","1.4.3","2.0.0.rc3","2.0.0.rc4","2.0.0.rc5","semver","v1.0.0","v1.1.0","v1.2.0","v1.2.1","v1.3.0","v1.3.1","v1.3.2","v1.4.0","v1.4.1","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v1.4.6","v2.0.0","v2.0.0.beta2","v2.0.0.rc1","v2.0.0.rc2","v2.0.0.rc3","v2.0.0.rc4","v2.0.0.rc5","v2.0.0.rc6","v2.0.1","v2.0.1.rc1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.8","v2.0.8.1","v2.1.0","v2.2.0","v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.0.5","v3.0.6","v3.1.0","v3.2.0","v4.0.0","v4.1.0","v4.1.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-61921.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U"}]}