Description
A signed integer overflow in docopt.cpp v0.6.2 (LeafPattern::match in docopt_private.h) when merging occurrence counters (e.g., default LONG_MAX + first user "-v/--verbose") can cause counter wrap (negative/unbounded semantics) and lead to logic/policy bypass in applications that rely on occurrence-based limits, rate-gating, or safety toggles. In hardened builds (e.g., UBSan or -ftrapv), the overflow may also result in process abort (DoS).
Published: 2026-01-23
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:docopt:docopt.cpp:0.6.2:*:*:*:*:*:*:*

Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Docopt
Docopt docopt.cpp
Vendors & Products Docopt
Docopt docopt.cpp

Fri, 23 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-190
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
Description A signed integer overflow in docopt.cpp v0.6.2 (LeafPattern::match in docopt_private.h) when merging occurrence counters (e.g., default LONG_MAX + first user "-v/--verbose") can cause counter wrap (negative/unbounded semantics) and lead to logic/policy bypass in applications that rely on occurrence-based limits, rate-gating, or safety toggles. In hardened builds (e.g., UBSan or -ftrapv), the overflow may also result in process abort (DoS).
References

Subscriptions

Docopt Docopt.cpp
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-01-23T16:14:32.425Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-67125

cve-icon Vulnrichment

Updated: 2026-01-23T16:14:06.626Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-23T16:15:52.347

Modified: 2026-02-11T19:44:52.320

Link: CVE-2025-67125

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-26T11:54:40Z

Weaknesses