CVE-2024-7254
Severity CVSS v4.0:
HIGH
Type:
CWE-400
Uncontrolled Resource Consumption ('Resource Exhaustion')
Publication date:
19/09/2024
Last modified:
26/09/2025
Description
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:google:protobuf:*:*:*:*:*:ruby:*:* | 3.25.5 (excluding) | |
| cpe:2.3:a:google:protobuf:*:*:*:*:*:ruby:*:* | 4.0.0 (including) | 4.27.5 (excluding) |
| cpe:2.3:a:google:protobuf:*:*:*:*:*:ruby:*:* | 4.28.0 (including) | 4.28.2 (excluding) |
| cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:* | 3.25.5 (excluding) | |
| cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:* | 4.0.0 (including) | 4.27.5 (excluding) |
| cpe:2.3:a:google:protobuf-java:*:*:*:*:*:*:*:* | 4.28.0 (including) | 4.28.2 (excluding) |
| cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:* | 3.25.5 (excluding) | |
| cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:* | 4.0.0 (including) | 4.27.5 (excluding) |
| cpe:2.3:a:google:protobuf-javalite:*:*:*:*:*:*:*:* | 4.28.0 (including) | 4.28.2 (excluding) |
| cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:* | 3.25.5 (excluding) | |
| cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:* | 4.0.0 (including) | 4.27.5 (excluding) |
| cpe:2.3:a:google:protobuf-kotlin:*:*:*:*:*:*:*:* | 4.28.0 (including) | 4.28.2 (excluding) |
| cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:* | 3.25.5 (excluding) | |
| cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:* | 4.0.0 (including) | 4.27.5 (excluding) |
| cpe:2.3:a:google:protobuf-kotlin-lite:*:*:*:*:*:*:*:* | 4.28.0 (including) | 4.28.2 (including) |
To consult the complete list of CPE names with products and versions, see this page



