Generated remediation guidance and an executive summary. No account required.
Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.
Cite this page
CVE-2025-47287. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-47287
Use CWE-770, Tornadoweb vendor hub and Tornado product page to widen CVE-2025-47287 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-31958, CVE-2025-67726 and CVE-2025-67725 for nearby disclosures in the same product family.