CVE-2025-59028
đļ mediumSummary
When sending invalid base64 SASL data, login process is disconnected from the auth server, causing all active authentication sessions to fail. Invalid BASE64 data can be used to DoS a vulnerable server to break concurrent logins. Install fixed version or disable concurrency in login processes (heavy perfomance penalty on large deployments). No publicly available exploits are known.
CVSS Score
5.3
Medium
EPSS Score
0.1
Exploit Probability
Published Date
2026-03-27
First Seen: 2026-03-28
đ Relative Risk Intelligence
This CVE is Lower Risk - more severe than 19.8% of all 321,566 vulnerabilities in our database.
#257,788
Below average severity
Severity Percentile
đ¯ CISA SSVC Assessment Updated: Mar 27, 2026
đ Exploitation Status
None
No known exploits
âī¸ Automatable
YES
Can be exploited automatically
đĨ Technical Impact
Partial
Limited system impact
SSVC data provided by
CISA
Last Modified
2026-04-30
Source
NVD đ
CVSS Vector 3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CWE IDs (Weakness Types)