GHSA-R92C-9C7F-3PJ8

Tofu Init, CPU Quit: The Algorithmic Zip Bomb in OpenTofu

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 22, 2026·6 min read·2 visits

Executive Summary (TL;DR)

If you use OpenTofu to manage infrastructure, a malicious module source can freeze your deployment pipeline. By feeding `tofu init` a specially crafted ZIP file, an attacker can trigger an O(N^2) file indexing loop in the Go runtime, pegging the CPU at 100% and halting CI/CD jobs indefinitely. Fixed in OpenTofu v1.11.4 by updating the Go toolchain.

OpenTofu versions prior to v1.11.4 are vulnerable to a Denial of Service (DoS) attack triggered by processing maliciously crafted ZIP archives. The flaw originates in the underlying Go standard library's `archive/zip` package, allowing attackers to stall `tofu init` operations via algorithmic complexity exhaustion.

Fix Analysis (1)

Technical Appendix

CVSS Score
7.5/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Probability
0.10%
Top 100% most exploited

Affected Systems

OpenTofu CLI < 1.11.4CI/CD Pipelines running vulnerable OpenTofuDeveloper workstations using `tofu init`

Affected Versions Detail

Product
Affected Versions
Fixed Version
OpenTofu
OpenTofu
< 1.11.41.11.4
AttributeDetail
Vulnerability IDGHSA-R92C-9C7F-3PJ8
Underlying CVECVE-2025-61728 (Go)
Attack VectorNetwork (Malicious Dependency)
ImpactDenial of Service (Resource Exhaustion)
SeverityHigh (Availability)
Root CauseO(N^2) Complexity in archive/zip
CWE-407
Inefficient Algorithmic Complexity

The software uses an algorithm with cubic or higher complexity O(n^3) to process input, which can be triggered by an attacker to cause a denial of service.

Vulnerability Timeline

Fix commit pushed to OpenTofu repository
2025-02-15
OpenTofu v1.11.4 released
2025-02-16
GHSA Advisory Published
2025-02-18

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.