Skip to content

Uncontrolled Resource Consumption in Spray JSON

Moderate severity GitHub Reviewed Published Jun 28, 2022 to the GitHub Advisory Database • Updated Sep 30, 2025

Package

maven io.spray:spray-json_2.10 (Maven)

Affected versions

< 1.3.5

Patched versions

1.3.5
maven io.spray:spray-json_2.11 (Maven)
< 1.3.5
1.3.5
maven io.spray:spray-json_2.11.0-RC4 (Maven)
< 1.3.5
None
maven io.spray:spray-json_2.12 (Maven)
< 1.3.5
1.3.5
maven io.spray:spray-json_2.12.0-M3 (Maven)
< 1.3.5
None
maven io.spray:spray-json_2.12.0-M5 (Maven)
< 1.3.5
None
maven io.spray:spray-json_2.12.0-RC1 (Maven)
< 1.3.5
None
maven io.spray:spray-json_2.12.0-RC2 (Maven)
< 1.3.5
None
maven io.spray:spray-json_2.13.0-M2 (Maven)
< 1.3.5
None
maven io.spray:spray-json_2.13.0-M4 (Maven)
< 1.3.5
None
maven io.spray:spray-json_2.13.0-M5 (Maven)
< 1.3.5
1.3.5
maven io.spray:spray-json_2.9.3 (Maven)
< 1.3.5
None

Description

Recursive decent parsers are susceptible too StackOverflowExceptions on too deeply nested structures as currently "open" parsing state is kept on the stack.

References

Published to the GitHub Advisory Database Jun 28, 2022
Reviewed Jun 28, 2022
Last updated Sep 30, 2025

Severity

Moderate

EPSS score

Weaknesses

Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource. Learn more on MITRE.

CVE ID

CVE-2018-18855

GHSA ID

GHSA-ww3v-6xjf-jv28

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.