Overview
The vulnerability identified as CVE-2025-23325 is a serious cybersecurity issue affecting the NVIDIA Triton Inference Server for both Windows and Linux platforms. The vulnerability could allow attackers to instigate uncontrolled recursion through a specifically crafted input. This could result in a denial of service, potentially leading to system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2025-23325
Severity: High (7.5 CVSS)
Attack Vector: Network
Privileges Required: Low
User Interaction: None
Impact: System compromise, potential data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
NVIDIA Triton Inference Server | All prior versions
How the Exploit Works
The exploit works by an attacker sending a specially crafted input to the NVIDIA Triton Inference Server. This input triggers an uncontrolled recursion in the system, causing it to consume system resources excessively. The excessive use of resources can lead to a system crash or denial of service, potentially giving the attacker an opportunity to compromise the system or leak sensitive data.
Conceptual Example Code
Here is a conceptual example of how the vulnerability might be exploited using a HTTP request:
POST /NVIDIA/Triton/Server/Endpoint HTTP/1.1
Host: target.example.com
Content-Type: application/json
{ "specially_crafted_input": "trigger_uncontrolled_recursion" }
In this example, the `specially_crafted_input` is designed to trigger the uncontrolled recursion vulnerability in the NVIDIA Triton Inference Server, leading to the potential system compromise and data leakage.
Recommended Mitigation
NVIDIA has released a patch to address this vulnerability. All users of the affected server are urged to apply this patch immediately. Alternatively, users can employ a Web Application Firewall (WAF) or Intrusion Detection System (IDS) as a temporary mitigation measure.

