Investigate vulnerability: protobuf-python has a potential Denial of Service issue
Issue created from vulnerability <a href="https://labs.etsi.org/rep/ocf/capif/-/security/vulnerabilities/14">14</a>
### Description:
Any project that uses Protobuf pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of **recursive groups**, **recursive messages** or **a series of [`SGROUP`](https://protobuf.dev/programming-guides/encoding/#groups) tags** can be corrupted by exceeding the Python recursion limit.
Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team
[ecosystem@trailofbits.com](mailto:ecosystem@trailofbits.com)
* Severity: unknown
* Location: [services/TS29222_CAPIF_API_Invoker_Management_API/requirements.txt](https://labs.etsi.org/rep/rep/ocf/capif/-/blob/e0aeae5bfbf96a27a90486a702b28d9f3621ce1c/services/TS29222_CAPIF_API_Invoker_Management_API/requirements.txt)
### Solution:
Upgrade to versions 4.25.8, 5.29.5, 6.31.1 or above.
### Identifiers:
* [CWE-937](https://cwe.mitre.org/data/definitions/937.html)
* [CWE-1035](https://cwe.mitre.org/data/definitions/1035.html)
* Gemnasium-0aea0b39-50bb-4660-ad1f-22ce501a3c8f
* [CVE-2025-4565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4565)
* [GHSA-8qvm-5x2c-j2w7](https://github.com/advisories/GHSA-8qvm-5x2c-j2w7)
* [CWE-674](https://cwe.mitre.org/data/definitions/674.html)
### Scanner:
* Name: gemnasium-python
issue