Redlib is an alternative private front-end to Reddit. A vulnerability has been identified in Redlib where an attacker can cause a denial-of-service (DOS) condition by submitting a specially crafted base2048-encoded DEFLATE decompression bomb to the restore_preferences form. This leads to excessive memory consumption and potential system instability, which can be exploited to disrupt Redlib instances. This vulnerability is fixed in 0.36.0.
References
Configurations
History
03 Feb 2026, 16:47
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CPE | cpe:2.3:a:redlib:redlib:*:*:*:*:*:*:*:* | |
| First Time |
Redlib redlib
Redlib |
|
| References | () https://github.com/redlib-org/redlib/commit/15147cea8e42f6569a11603d661d71122f6a02dc - Patch | |
| References | () https://github.com/redlib-org/redlib/commit/2e95e1fc6e2064ccfae87964b4860bda55eddb9a - Patch | |
| References | () https://github.com/redlib-org/redlib/security/advisories/GHSA-g8vq-v3mg-7mrg - Patch, Vendor Advisory |
Information
Published : 2025-03-20 19:15
Updated : 2026-02-03 16:47
NVD link : CVE-2025-30160
Mitre link : CVE-2025-30160
CVE.ORG link : CVE-2025-30160
JSON object : View
Products Affected
redlib
- redlib
