The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-47287

CVE-2025-47287: Tornadoweb Tornado DoS Vulnerability

CVE-2025-47287 is a denial of service flaw in Tornadoweb Tornado's multipart/form-data parser that enables attackers to generate excessive logs. This article covers technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2025-47287 Overview

CVE-2025-47287 is a Denial of Service (DoS) vulnerability affecting Tornado, a widely-used Python web framework and asynchronous networking library. The vulnerability exists in Tornado's multipart/form-data parser, which continues processing data after encountering certain parsing errors while logging warnings for each error. This behavior allows remote attackers to craft malicious requests that generate an extremely high volume of log entries, effectively causing a denial of service condition. The impact is further amplified because Tornado's logging subsystem operates synchronously, meaning each log write blocks the event loop and degrades application performance.

Critical Impact

Remote attackers can exploit this vulnerability to cause service disruption through log flooding, with the synchronous logging mechanism amplifying the DoS impact on affected Tornado applications.

Affected Products

  • Tornadoweb Tornado versions prior to 6.5.0
  • Debian Linux 11.0

Discovery Timeline

  • May 15, 2025 - CVE-2025-47287 published to NVD
  • December 23, 2025 - Last updated in NVD database

Technical Details for CVE-2025-47287

Vulnerability Analysis

This vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling). The flaw resides in the multipart/form-data request parser within Tornado's HTTP handling code. When the parser encounters malformed boundary markers or other parsing errors within multipart form data, it logs a warning message but then attempts to continue parsing the remaining data. An attacker can craft a request containing numerous intentional parsing errors, causing the parser to generate a warning log entry for each error encountered.

The severity of this DoS attack is compounded by a critical architectural characteristic: Tornado's logging subsystem is synchronous. In an asynchronous framework like Tornado, synchronous operations block the event loop, preventing other requests from being processed. When thousands of log entries are generated in rapid succession, the application becomes unresponsive as it spends the majority of its time writing log messages rather than handling legitimate requests.

Root Cause

The root cause lies in the error handling logic of the multipart form-data parser. Instead of terminating parsing when errors are detected, the parser logs warnings and continues processing. Combined with no rate limiting on log generation and the synchronous nature of Python's standard logging module, this creates a resource exhaustion vector. The vulnerable parser is enabled by default in all Tornado installations, making every application using Tornado's built-in form parsing potentially vulnerable.

Attack Vector

The attack is network-based and requires no authentication or user interaction. An attacker sends HTTP POST requests with Content-Type: multipart/form-data headers containing deliberately malformed multipart boundaries. Each malformed boundary triggers a logging operation, and the synchronous logging blocks Tornado's event loop. By sending requests with hundreds or thousands of malformed boundaries, an attacker can:

  1. Exhaust disk space through excessive log file growth
  2. Block the event loop, preventing legitimate request handling
  3. Cause CPU exhaustion as the system processes log writes
  4. Potentially trigger log rotation overhead if configured

The attack requires minimal bandwidth from the attacker's perspective while causing disproportionate resource consumption on the target server.

Detection Methods for CVE-2025-47287

Indicators of Compromise

  • Unusually rapid growth in application log files, particularly warning-level entries related to multipart parsing
  • High volume of HTTP POST requests with Content-Type: multipart/form-data from single or multiple IP addresses
  • Increased disk I/O activity correlated with incoming HTTP traffic
  • Application performance degradation or unresponsiveness during periods of normal-looking traffic volume

Detection Strategies

  • Monitor log file growth rates and alert on anomalous increases, particularly in Tornado application logs
  • Implement request rate limiting and monitor for violations, focusing on POST requests with multipart content types
  • Configure web application firewalls (WAF) to detect and flag malformed multipart boundaries in request bodies
  • Track response latency metrics to identify when synchronous logging is impacting application performance

Monitoring Recommendations

  • Set up alerting on disk usage thresholds for partitions containing application logs
  • Implement centralized log aggregation with anomaly detection for sudden spikes in warning-level log entries
  • Monitor Tornado event loop latency metrics to detect blocking operations
  • Track the ratio of multipart form requests to successful form submissions to identify attack patterns

How to Mitigate CVE-2025-47287

Immediate Actions Required

  • Upgrade Tornado to version 6.5.0 or later, which contains the fix for this vulnerability
  • If immediate upgrade is not possible, implement the proxy-based workaround to block malicious multipart requests
  • Review and configure log rotation policies to prevent disk exhaustion during an active attack
  • Consider implementing asynchronous logging handlers to reduce event loop blocking

Patch Information

The vulnerability has been addressed in Tornado version 6.5.0. The fix is available in commit b39b892bf78fe8fea01dd45199aa88307e7162f3. Users should upgrade to the patched version immediately. For Debian Linux 11.0 users, consult the Debian LTS Announcement for distribution-specific patching guidance. Additional details are available in the GitHub Security Advisory GHSA-7cx3-6m66-7c5m.

Workarounds

  • Block requests with Content-Type: multipart/form-data at the reverse proxy or load balancer level if multipart form handling is not required by your application
  • Implement rate limiting on POST requests at the proxy layer to reduce the impact of flooding attempts
  • Configure log output to use asynchronous handlers (such as Python's QueueHandler) to minimize event loop blocking
  • Restrict multipart form endpoints to authenticated users only to reduce the attack surface
bash
# Nginx configuration to block multipart/form-data requests as a workaround
# Add this to your server or location block
if ($content_type ~* "multipart/form-data") {
    return 403;
}

# Alternative: Rate limit multipart requests
limit_req_zone $binary_remote_addr zone=multipart_limit:10m rate=10r/s;
location /upload {
    limit_req zone=multipart_limit burst=20 nodelay;
    proxy_pass http://tornado_backend;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechTornado

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.28%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-770
  • Technical References
  • Debian LTS Announcement
  • Vendor Resources
  • GitHub Tornado Commit Update

  • GitHub Security Advisory GHSA-7cx3-6m66-7c5m
  • Related CVEs
  • CVE-2026-31958: Tornado Framework DoS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English