The MadeYouReset HTTP/2 Vulnerability - What Is It?
During recent research into HTTP/2, I found a DoS vulnerability I named MadeYouReset (CVE-2025-8671). It lets an attacker create effectively unbounded concurrent work on servers while bypassing HTTP/2’s built‑in concurrency limit. It builds on the flaw behind 2023’s “Rapid Reset”, with a neat twist that slips past the usual mitigation. In this post, we’ll cover the concept at a high level, how and why it works, and begin to explain why so many implementations were affected by zooming in on a common proxy deployment.