CVE-2026-27695

Medium
|5.3
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to overwhelm a high-traffic service by exceeding the allowed request limits, which can slow down or disrupt not only that service but also other services sharing the same database resources. This issue occurs when multiple entities use the same database partition key, making it easier for an attacker to cause service degradation if they can generate enough traffic.

Technical Description

zae-limiter is a rate limiting library using the token bucket algorithm. Prior to version 0.10.1, all rate limit buckets for a single entity share the same DynamoDB partition key (`namespace/ENTITY#{id}`). A high-traffic entity can exceed DynamoDB's per-partition throughput limits (~1,000 WCU/sec), causing throttling that degrades service for that entity — and potentially co-located entities in the same partition. Version 0.10.1 fixes the issue.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactLow
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$724($500-$1K)
Vendor Response
Grade APatched in 1 day

Quick Information

Published

Feb 25, 2026

about 1 month ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

zeroae

Product

zae-limiter