Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/nodejs24@1:24.14.1-2?arch=el10_1
Typerpm
Namespaceredhat
Namenodejs24
Version1:24.14.1-2
Qualifiers
arch el10_1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1vp3-fzdr-yqbm
vulnerability_id VCID-1vp3-fzdr-yqbm
summary Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21715.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21715
reference_id
reference_type
scores
0
value 4e-05
scoring_system epss
scoring_elements 0.00177
published_at 2026-04-04T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00201
published_at 2026-04-08T12:55:00Z
2
value 5e-05
scoring_system epss
scoring_elements 0.002
published_at 2026-04-09T12:55:00Z
3
value 5e-05
scoring_system epss
scoring_elements 0.00202
published_at 2026-04-13T12:55:00Z
4
value 5e-05
scoring_system epss
scoring_elements 0.00204
published_at 2026-04-16T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.00205
published_at 2026-04-18T12:55:00Z
6
value 5e-05
scoring_system epss
scoring_elements 0.00216
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21715
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453152
reference_id 2453152
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453152
5
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
6
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
7
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
aliases CVE-2026-21715
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vp3-fzdr-yqbm
1
url VCID-2t7c-dju9-pff6
vulnerability_id VCID-2t7c-dju9-pff6
summary Node.js: Node.js: Information disclosure via timing oracle in HMAC verification
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21713.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21713.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21713
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.0144
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03543
published_at 2026-04-04T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0556
published_at 2026-04-18T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05602
published_at 2026-04-12T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05595
published_at 2026-04-13T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05546
published_at 2026-04-16T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05575
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05613
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05638
published_at 2026-04-09T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05611
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21713
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21713
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453160
reference_id 2453160
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453160
5
reference_url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
reference_id march-2026-security-releases
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-30T19:45:13Z/
url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
6
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
7
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
8
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
aliases CVE-2026-21713
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2t7c-dju9-pff6
2
url VCID-96yh-1wub-zucg
vulnerability_id VCID-96yh-1wub-zucg
summary Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21714.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21714.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21714
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.0161
published_at 2026-04-04T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02672
published_at 2026-04-18T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02382
published_at 2026-04-02T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02682
published_at 2026-04-13T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02664
published_at 2026-04-16T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03389
published_at 2026-04-07T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03392
published_at 2026-04-08T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03414
published_at 2026-04-09T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03372
published_at 2026-04-11T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03344
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21714
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21714
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453161
reference_id 2453161
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453161
5
reference_url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
reference_id march-2026-security-releases
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T16:14:45Z/
url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
6
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
7
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
8
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
aliases CVE-2026-21714
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-96yh-1wub-zucg
3
url VCID-bjza-25hu-vkad
vulnerability_id VCID-bjza-25hu-vkad
summary nodejs: Nodejs denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21637.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21637
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.1369
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.1348
published_at 2026-04-18T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13618
published_at 2026-04-12T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.1357
published_at 2026-04-13T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13484
published_at 2026-04-16T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13752
published_at 2026-04-04T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13552
published_at 2026-04-07T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13633
published_at 2026-04-08T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13684
published_at 2026-04-09T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13654
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21637
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2431340
reference_id 2431340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2431340
5
reference_url https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
reference_id december-2025-security-releases
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:22:28Z/
url https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
6
reference_url https://access.redhat.com/errata/RHSA-2026:1842
reference_id RHSA-2026:1842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1842
7
reference_url https://access.redhat.com/errata/RHSA-2026:1843
reference_id RHSA-2026:1843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1843
8
reference_url https://access.redhat.com/errata/RHSA-2026:2420
reference_id RHSA-2026:2420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2420
9
reference_url https://access.redhat.com/errata/RHSA-2026:2421
reference_id RHSA-2026:2421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2421
10
reference_url https://access.redhat.com/errata/RHSA-2026:2422
reference_id RHSA-2026:2422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2422
11
reference_url https://access.redhat.com/errata/RHSA-2026:2767
reference_id RHSA-2026:2767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2767
12
reference_url https://access.redhat.com/errata/RHSA-2026:2768
reference_id RHSA-2026:2768
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2768
13
reference_url https://access.redhat.com/errata/RHSA-2026:2781
reference_id RHSA-2026:2781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2781
14
reference_url https://access.redhat.com/errata/RHSA-2026:2782
reference_id RHSA-2026:2782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2782
15
reference_url https://access.redhat.com/errata/RHSA-2026:2783
reference_id RHSA-2026:2783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2783
16
reference_url https://access.redhat.com/errata/RHSA-2026:2864
reference_id RHSA-2026:2864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2864
17
reference_url https://access.redhat.com/errata/RHSA-2026:2899
reference_id RHSA-2026:2899
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2899
18
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
19
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
20
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
aliases CVE-2026-21637
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjza-25hu-vkad
4
url VCID-dgkh-jdah-wfh9
vulnerability_id VCID-dgkh-jdah-wfh9
summary nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21717.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21717.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21717
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04143
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05391
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07331
published_at 2026-04-18T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07425
published_at 2026-04-12T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07414
published_at 2026-04-13T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07343
published_at 2026-04-16T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07373
published_at 2026-04-07T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07429
published_at 2026-04-08T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07452
published_at 2026-04-09T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07439
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21717
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21717
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453162
reference_id 2453162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453162
5
reference_url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
reference_id march-2026-security-releases
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-30T19:46:02Z/
url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
6
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
7
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
8
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
aliases CVE-2026-21717
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgkh-jdah-wfh9
5
url VCID-dt7u-3usg-9uet
vulnerability_id VCID-dt7u-3usg-9uet
summary Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21710.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21710
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.0252
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03788
published_at 2026-04-04T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05763
published_at 2026-04-18T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05797
published_at 2026-04-12T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.0579
published_at 2026-04-13T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05755
published_at 2026-04-16T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05762
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05801
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05826
published_at 2026-04-09T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05805
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21710
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453151
reference_id 2453151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453151
5
reference_url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
reference_id march-2026-security-releases
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:55:20Z/
url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
6
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
7
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
8
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
9
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
10
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
11
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
12
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
13
reference_url https://access.redhat.com/errata/RHSA-2026:7896
reference_id RHSA-2026:7896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7896
14
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
15
reference_url https://access.redhat.com/errata/RHSA-2026:8339
reference_id RHSA-2026:8339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8339
fixed_packages
aliases CVE-2026-21710
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dt7u-3usg-9uet
6
url VCID-fetp-hvhq-dube
vulnerability_id VCID-fetp-hvhq-dube
summary Node.js: Node.js: Denial of Service via malformed Internationalized Domain Name processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21712.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21712.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21712
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01719
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02676
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02781
published_at 2026-04-18T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02838
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02807
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02788
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02784
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02769
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02814
published_at 2026-04-07T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02817
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21712
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453037
reference_id 2453037
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453037
4
reference_url https://hackerone.com/reports/3546390
reference_id 3546390
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-30T15:52:17Z/
url https://hackerone.com/reports/3546390
5
reference_url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
reference_id march-2026-security-releases
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-30T15:52:17Z/
url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
6
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
7
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
8
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
aliases CVE-2026-21712
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fetp-hvhq-dube
7
url VCID-gv39-q6pw-yfh4
vulnerability_id VCID-gv39-q6pw-yfh4
summary nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27135.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27135
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04001
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03983
published_at 2026-04-18T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04057
published_at 2026-04-09T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.0403
published_at 2026-04-11T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04016
published_at 2026-04-12T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03988
published_at 2026-04-13T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03971
published_at 2026-04-16T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04018
published_at 2026-04-04T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04032
published_at 2026-04-07T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04038
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27135
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27135
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131369
reference_id 1131369
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131369
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448754
reference_id 2448754
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448754
6
reference_url https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1
reference_id 5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T18:36:41Z/
url https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1
7
reference_url https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6
reference_id GHSA-6933-cjhr-5qg6
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-18T18:36:41Z/
url https://github.com/nghttp2/nghttp2/security/advisories/GHSA-6933-cjhr-5qg6
8
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
9
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
10
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
11
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
12
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
13
reference_url https://access.redhat.com/errata/RHSA-2026:7666
reference_id RHSA-2026:7666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7666
14
reference_url https://access.redhat.com/errata/RHSA-2026:7667
reference_id RHSA-2026:7667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7667
15
reference_url https://access.redhat.com/errata/RHSA-2026:7668
reference_id RHSA-2026:7668
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7668
16
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
17
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
18
reference_url https://access.redhat.com/errata/RHSA-2026:7896
reference_id RHSA-2026:7896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7896
19
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
20
reference_url https://access.redhat.com/errata/RHSA-2026:8339
reference_id RHSA-2026:8339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8339
21
reference_url https://access.redhat.com/errata/RHSA-2026:8538
reference_id RHSA-2026:8538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8538
22
reference_url https://access.redhat.com/errata/RHSA-2026:8539
reference_id RHSA-2026:8539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8539
23
reference_url https://access.redhat.com/errata/RHSA-2026:8540
reference_id RHSA-2026:8540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8540
24
reference_url https://access.redhat.com/errata/RHSA-2026:8541
reference_id RHSA-2026:8541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8541
25
reference_url https://access.redhat.com/errata/RHSA-2026:8545
reference_id RHSA-2026:8545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8545
26
reference_url https://access.redhat.com/errata/RHSA-2026:8546
reference_id RHSA-2026:8546
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8546
27
reference_url https://access.redhat.com/errata/RHSA-2026:8547
reference_id RHSA-2026:8547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8547
28
reference_url https://access.redhat.com/errata/RHSA-2026:8548
reference_id RHSA-2026:8548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8548
fixed_packages
aliases CVE-2026-27135
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gv39-q6pw-yfh4
8
url VCID-hgd1-7u6j-p7dh
vulnerability_id VCID-hgd1-7u6j-p7dh
summary
Undici has Unhandled Exception in WebSocket Client Due to Invalid server_max_window_bits Validation
### Impact

The undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the `server_max_window_bits` parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically advertises support for permessage-deflate compression. A malicious server can respond with an out-of-range `server_max_window_bits` value (outside zlib's valid range of 8-15). When the server subsequently sends a compressed frame, the client attempts to create a zlib InflateRaw instance with the invalid windowBits value, causing a synchronous RangeError exception that is not caught, resulting in immediate process termination.

The vulnerability exists because:

1. The `isValidClientWindowBits()` function only validates that the value contains ASCII digits, not that it falls within the valid range 8-15
2. The `createInflateRaw()` call is not wrapped in a try-catch block
3. The resulting exception propagates up through the call stack and crashes the Node.js process

### Patches
_Has the problem been patched? What versions should users upgrade to?_

### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2229.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2229
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40468
published_at 2026-04-02T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40467
published_at 2026-04-08T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40417
published_at 2026-04-07T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40494
published_at 2026-04-04T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40462
published_at 2026-04-12T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40499
published_at 2026-04-11T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40478
published_at 2026-04-09T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.42462
published_at 2026-04-16T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42413
published_at 2026-04-13T12:55:00Z
9
value 0.00203
scoring_system epss
scoring_elements 0.42437
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2229
2
reference_url https://cna.openjsf.org/security-advisories.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/
url https://cna.openjsf.org/security-advisories.html
3
reference_url https://datatracker.ietf.org/doc/html/rfc7692
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/
url https://datatracker.ietf.org/doc/html/rfc7692
4
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
5
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8
6
reference_url https://hackerone.com/reports/3487486
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/
url https://hackerone.com/reports/3487486
7
reference_url https://nodejs.org/api/zlib.html#class-zlibinflateraw
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/
url https://nodejs.org/api/zlib.html#class-zlibinflateraw
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-2229
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-2229
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130884
reference_id 1130884
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130884
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447143
reference_id 2447143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447143
11
reference_url https://github.com/advisories/GHSA-v9p9-hfj2-hcw8
reference_id GHSA-v9p9-hfj2-hcw8
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v9p9-hfj2-hcw8
12
reference_url https://access.redhat.com/errata/RHSA-2026:5807
reference_id RHSA-2026:5807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5807
13
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
14
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
15
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
16
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
17
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
18
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
19
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
20
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
fixed_packages
aliases CVE-2026-2229, GHSA-v9p9-hfj2-hcw8
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgd1-7u6j-p7dh
9
url VCID-hzsn-68be-dkej
vulnerability_id VCID-hzsn-68be-dkej
summary
minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern
### Summary
`minimatch` is vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive `*` wildcards followed by a literal character that doesn't appear in the test string. Each `*` compiles to a separate `[^/]*?` regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits.

The time complexity is O(4^N) where N is the number of `*` characters. With N=15, a single `minimatch()` call takes ~2 seconds. With N=34, it hangs effectively forever.


### Details
_Give all details on the vulnerability. Pointing to the incriminated source code is very helpful for the maintainer._

### PoC
When minimatch compiles a glob pattern, each `*` becomes `[^/]*?` in the generated regex. For a pattern like `***************X***`:

```
/^(?!\.)[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?[^/]*?X[^/]*?[^/]*?[^/]*?$/
```

When the test string doesn't contain `X`, the regex engine must try every possible way to distribute the characters across all the `[^/]*?` groups before concluding no match exists. With N groups and M characters, this is O(C(N+M, N)) — exponential.
### Impact
Any application that passes user-controlled strings to `minimatch()` as the pattern argument is vulnerable to DoS. This includes:
- File search/filter UIs that accept glob patterns
- `.gitignore`-style filtering with user-defined rules
- Build tools that accept glob configuration
- Any API that exposes glob matching to untrusted input

----

Thanks to @ljharb for back-porting the fix to legacy versions of minimatch.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26996.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-26996.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-26996
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04658
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06694
published_at 2026-04-18T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06717
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06701
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.0675
published_at 2026-04-08T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06784
published_at 2026-04-09T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06785
published_at 2026-04-11T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06778
published_at 2026-04-12T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06771
published_at 2026-04-13T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06702
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-26996
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26996
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/isaacs/minimatch
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/minimatch
5
reference_url https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-20T15:31:36Z/
url https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
6
reference_url https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-20T15:31:36Z/
url https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-26996
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-26996
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128579
reference_id 1128579
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128579
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2441268
reference_id 2441268
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2441268
10
reference_url https://github.com/advisories/GHSA-3ppc-4f35-3m26
reference_id GHSA-3ppc-4f35-3m26
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3ppc-4f35-3m26
11
reference_url https://access.redhat.com/errata/RHSA-2026:4942
reference_id RHSA-2026:4942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4942
12
reference_url https://access.redhat.com/errata/RHSA-2026:5168
reference_id RHSA-2026:5168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5168
13
reference_url https://access.redhat.com/errata/RHSA-2026:5665
reference_id RHSA-2026:5665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5665
14
reference_url https://access.redhat.com/errata/RHSA-2026:6192
reference_id RHSA-2026:6192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6192
15
reference_url https://access.redhat.com/errata/RHSA-2026:6497
reference_id RHSA-2026:6497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6497
16
reference_url https://access.redhat.com/errata/RHSA-2026:6567
reference_id RHSA-2026:6567
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6567
17
reference_url https://access.redhat.com/errata/RHSA-2026:6568
reference_id RHSA-2026:6568
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6568
18
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
19
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
20
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
21
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
22
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
23
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
24
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
25
reference_url https://access.redhat.com/errata/RHSA-2026:7896
reference_id RHSA-2026:7896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7896
26
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
27
reference_url https://access.redhat.com/errata/RHSA-2026:8339
reference_id RHSA-2026:8339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8339
fixed_packages
aliases CVE-2026-26996, GHSA-3ppc-4f35-3m26
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hzsn-68be-dkej
10
url VCID-n6ew-t7g1-33gn
vulnerability_id VCID-n6ew-t7g1-33gn
summary
Undici has an HTTP Request/Response Smuggling issue
### Impact

Undici allows duplicate HTTP `Content-Length` headers when they are provided in an array with case-variant names (e.g., `Content-Length` and `content-length`). This produces malformed HTTP/1.1 requests with multiple conflicting `Content-Length` values on the wire.

**Who is impacted:**
  - Applications using `undici.request()`, `undici.Client`, or similar low-level APIs with headers passed as flat arrays
  - Applications that accept user-controlled header names without case-normalization

**Potential consequences:**
  - **Denial of Service**: Strict HTTP parsers (proxies, servers) will reject requests with duplicate `Content-Length` headers (400 Bad Request)
  - **HTTP Request Smuggling**: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking

### Patches

 Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

### Workarounds

  If upgrading is not immediately possible:

  1. **Validate header names**: Ensure no duplicate `Content-Length` headers (case-insensitive) are present before passing headers to undici
  2. **Use object format**: Pass headers as a plain object (`{ 'content-length': '123' }`) rather than an array, which naturally deduplicates by key
  3. **Sanitize user input**: If headers originate from user input, normalize header names to lowercase and reject duplicates
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1525.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1525
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03768
published_at 2026-04-07T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03742
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03754
published_at 2026-04-04T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03771
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03735
published_at 2026-04-12T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03756
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03795
published_at 2026-04-09T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04431
published_at 2026-04-18T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04422
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04453
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1525
2
reference_url https://cna.openjsf.org/security-advisories.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/
url https://cna.openjsf.org/security-advisories.html
3
reference_url https://cwe.mitre.org/data/definitions/444.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/
url https://cwe.mitre.org/data/definitions/444.html
4
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
5
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm
6
reference_url https://hackerone.com/reports/3556037
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/
url https://hackerone.com/reports/3556037
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-1525
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-1525
8
reference_url https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/
url https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130879
reference_id 1130879
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130879
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447144
reference_id 2447144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447144
11
reference_url https://github.com/advisories/GHSA-2mjp-6q6p-2qxm
reference_id GHSA-2mjp-6q6p-2qxm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2mjp-6q6p-2qxm
12
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
13
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
14
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
15
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
16
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
17
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
18
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
19
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
fixed_packages
aliases CVE-2026-1525, GHSA-2mjp-6q6p-2qxm
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n6ew-t7g1-33gn
11
url VCID-ph2p-u33d-8yh3
vulnerability_id VCID-ph2p-u33d-8yh3
summary
Undici has CRLF Injection in undici via `upgrade` option
### Impact

When an application passes user-controlled input to the `upgrade` option of `client.request()`, an attacker can inject CRLF sequences (`\r\n`) to:

1. Inject arbitrary HTTP headers
2. Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)

The vulnerability exists because undici writes the `upgrade` value directly to the socket without validating for invalid header characters:

```javascript
// lib/dispatcher/client-h1.js:1121
if (upgrade) {
  header += `connection: upgrade\r\nupgrade: ${upgrade}\r\n`
}
```

### Patches

 Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

### Workarounds

Sanitize the `upgrade` option string before passing to undici:

```javascript
function sanitizeUpgrade(value) {
  if (/[\r\n]/.test(value)) {
    throw new Error('Invalid upgrade value')
  }
  return value
}

client.request({
  upgrade: sanitizeUpgrade(userInput)
})
```
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1527.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1527
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01235
published_at 2026-04-13T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01241
published_at 2026-04-18T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01228
published_at 2026-04-16T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00946
published_at 2026-04-04T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00934
published_at 2026-04-12T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00938
published_at 2026-04-11T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00954
published_at 2026-04-08T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.0095
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1527
2
reference_url https://cna.openjsf.org/security-advisories.html
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:05:24Z/
url https://cna.openjsf.org/security-advisories.html
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:05:24Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq
5
reference_url https://hackerone.com/reports/3487198
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:05:24Z/
url https://hackerone.com/reports/3487198
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-1527
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-1527
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130882
reference_id 1130882
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130882
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447141
reference_id 2447141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447141
9
reference_url https://github.com/advisories/GHSA-4992-7rv2-5pvq
reference_id GHSA-4992-7rv2-5pvq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4992-7rv2-5pvq
10
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
11
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
12
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
aliases CVE-2026-1527, GHSA-4992-7rv2-5pvq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph2p-u33d-8yh3
12
url VCID-q4u6-6pbw-5bcq
vulnerability_id VCID-q4u6-6pbw-5bcq
summary
@isaacs/brace-expansion has Uncontrolled Resource Consumption
### Summary

`@isaacs/brace-expansion` is vulnerable to a Denial of Service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process.

### Details

The vulnerability occurs because `@isaacs/brace-expansion` expands brace expressions without any upper bound or complexity limit. Expansion is performed eagerly and synchronously, meaning the full result set is generated before returning control to the caller.

For example, the following input:

```
{0..99}{0..99}{0..99}{0..99}{0..99}
```

produces:

```
100^5 = 10,000,000,000 combinations
```

This exponential growth can quickly overwhelm the event loop and heap memory, resulting in process termination.

### Proof of Concept

The following script reliably triggers the issue.

Create `poc.js`:

```js
const { expand } = require('@isaacs/brace-expansion');

const pattern = '{0..99}{0..99}{0..99}{0..99}{0..99}';

console.log('Starting expansion...');
expand(pattern);
```

Run it:

```bash
node poc.js
```

The process will freeze and typically crash with an error such as:

```
FATAL ERROR: JavaScript heap out of memory
```

### Impact

This is a denial of service vulnerability. Any application or downstream dependency that uses `@isaacs/brace-expansion` on untrusted input may be vulnerable to a single-request crash.

An attacker does not require authentication and can use a very small payload to:

* Trigger exponential computation
* Exhaust memory and CPU resources
* Block the event loop
* Crash Node.js services relying on this library
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25547.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-25547.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-25547
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.0519
published_at 2026-04-09T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05088
published_at 2026-04-02T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05144
published_at 2026-04-12T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05161
published_at 2026-04-11T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05118
published_at 2026-04-04T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05139
published_at 2026-04-07T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05173
published_at 2026-04-08T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05369
published_at 2026-04-18T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05366
published_at 2026-04-16T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05412
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-25547
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25547
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/isaacs/brace-expansion
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/brace-expansion
5
reference_url https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-05T14:24:50Z/
url https://github.com/isaacs/brace-expansion/security/advisories/GHSA-7h2j-956f-4vf2
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-25547
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-25547
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127313
reference_id 1127313
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127313
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2436942
reference_id 2436942
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2436942
9
reference_url https://github.com/advisories/GHSA-7h2j-956f-4vf2
reference_id GHSA-7h2j-956f-4vf2
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7h2j-956f-4vf2
10
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
11
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
12
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
13
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
14
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
15
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
16
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
fixed_packages
aliases CVE-2026-25547, GHSA-7h2j-956f-4vf2
risk_score 4.2
exploitability 0.5
weighted_severity 8.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4u6-6pbw-5bcq
13
url VCID-sy2z-sqgk-d7hg
vulnerability_id VCID-sy2z-sqgk-d7hg
summary
Undici has Unbounded Memory Consumption in WebSocket permessage-deflate Decompression
## Description

The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incoming compressed frames without enforcing any limit on the decompressed data size. A malicious WebSocket server can send a small compressed frame (a "decompression bomb") that expands to an extremely large size in memory, causing the Node.js process to exhaust available memory and crash or become unresponsive.

The vulnerability exists in the `PerMessageDeflate.decompress()` method, which accumulates all decompressed chunks in memory and concatenates them into a single Buffer without checking whether the total size exceeds a safe threshold.

## Impact

- Remote denial of service against any Node.js application using undici's WebSocket client
- A single compressed WebSocket frame of ~6 MB can decompress to ~1 GB or more
- Memory exhaustion occurs in native/external memory, bypassing V8 heap limits
- No application-level mitigation is possible as decompression occurs before message delivery

### Patches

Users should upgrade to fixed versions.

### Workarounds

No workaround are possible.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1526.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1526.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1526
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04862
published_at 2026-04-08T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04824
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04808
published_at 2026-04-04T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04834
published_at 2026-04-12T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04857
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.0488
published_at 2026-04-09T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05343
published_at 2026-04-16T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05394
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05345
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1526
2
reference_url https://cna.openjsf.org/security-advisories.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/
url https://cna.openjsf.org/security-advisories.html
3
reference_url https://datatracker.ietf.org/doc/html/rfc7692
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/
url https://datatracker.ietf.org/doc/html/rfc7692
4
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
5
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q
6
reference_url https://hackerone.com/reports/3481206
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/
url https://hackerone.com/reports/3481206
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-1526
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-1526
8
reference_url https://owasp.org/www-community/attacks/Denial_of_Service
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://owasp.org/www-community/attacks/Denial_of_Service
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130880
reference_id 1130880
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130880
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447142
reference_id 2447142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447142
11
reference_url https://github.com/advisories/GHSA-vrm6-8vpv-qv8q
reference_id GHSA-vrm6-8vpv-qv8q
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vrm6-8vpv-qv8q
12
reference_url https://access.redhat.com/errata/RHSA-2026:5807
reference_id RHSA-2026:5807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5807
13
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
14
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
15
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
16
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
17
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
18
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
19
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
20
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
fixed_packages
aliases CVE-2026-1526, GHSA-vrm6-8vpv-qv8q
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sy2z-sqgk-d7hg
14
url VCID-twc8-ewm7-wkb1
vulnerability_id VCID-twc8-ewm7-wkb1
summary nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21716.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21716.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21716
reference_id
reference_type
scores
0
value 4e-05
scoring_system epss
scoring_elements 0.00177
published_at 2026-04-02T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00199
published_at 2026-04-18T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.00169
published_at 2026-04-04T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00196
published_at 2026-04-09T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00198
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21716
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21716
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453157
reference_id 2453157
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453157
5
reference_url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
reference_id march-2026-security-releases
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-31T14:27:06Z/
url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
6
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
7
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
8
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
aliases CVE-2026-21716
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-twc8-ewm7-wkb1
15
url VCID-vdca-exd1-rfce
vulnerability_id VCID-vdca-exd1-rfce
summary
Undici has Unbounded Memory Consumption in its DeduplicationHandler via Response Buffering that leads to DoS
## Impact
This is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Service (DoS).

In vulnerable Undici versions, when `interceptors.deduplicate()` is enabled, response data for deduplicated requests could be accumulated in memory for downstream handlers. An attacker-controlled or untrusted upstream endpoint can exploit this with large/chunked responses and concurrent identical requests, causing high memory usage and potential OOM process termination.

Impacted users are applications that use Undici’s deduplication interceptor against endpoints that may produce large or long-lived response bodies.

## Patches

The issue has been patched by changing deduplication behavior to stream response chunks to downstream handlers as they arrive (instead of full-body accumulation), and by preventing late deduplication when body streaming has already started.

Users should upgrade to the first official Undici (and Node.js, where applicable) releases that include this patch.

## Workarounds
If upgrading immediately is not possible:

- Disable `interceptors.deduplicate()` for affected clients/routes.
- Use `skipHeaderNames` with a marker header to force high-risk requests to bypass deduplication.
- Avoid concurrent identical requests to untrusted endpoints that may return very large/chunked bodies.
- Apply upstream/proxy response-size and timeout limits.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2581.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2581
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04353
published_at 2026-04-12T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04366
published_at 2026-04-11T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04373
published_at 2026-04-09T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04357
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04325
published_at 2026-04-07T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04314
published_at 2026-04-04T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04293
published_at 2026-04-02T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.0499
published_at 2026-04-18T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05043
published_at 2026-04-13T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04985
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2581
2
reference_url https://cna.openjsf.org/security-advisories.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:49Z/
url https://cna.openjsf.org/security-advisories.html
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:49Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-phc3-fgpg-7m6h
5
reference_url https://hackerone.com/reports/3513473
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:49Z/
url https://hackerone.com/reports/3513473
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-2581
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-2581
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130885
reference_id 1130885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130885
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447140
reference_id 2447140
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447140
9
reference_url https://github.com/advisories/GHSA-phc3-fgpg-7m6h
reference_id GHSA-phc3-fgpg-7m6h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-phc3-fgpg-7m6h
10
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
11
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
12
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
aliases CVE-2026-2581, GHSA-phc3-fgpg-7m6h
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vdca-exd1-rfce
16
url VCID-xert-byqc-xbe2
vulnerability_id VCID-xert-byqc-xbe2
summary Node.js: Node.js: Unauthorized inter-process communication due to missing Unix Domain Socket permission checks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21711.json
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21711.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21711
reference_id
reference_type
scores
0
value 3e-05
scoring_system epss
scoring_elements 0.00125
published_at 2026-04-04T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00149
published_at 2026-04-18T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.00147
published_at 2026-04-13T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00146
published_at 2026-04-08T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00148
published_at 2026-04-12T12:55:00Z
5
value 5e-05
scoring_system epss
scoring_elements 0.00245
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21711
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453158
reference_id 2453158
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453158
4
reference_url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
reference_id march-2026-security-releases
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-01T15:02:57Z/
url https://nodejs.org/en/blog/vulnerability/march-2026-security-releases
5
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
6
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
7
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
aliases CVE-2026-21711
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xert-byqc-xbe2
17
url VCID-z7ac-jr58-gkfm
vulnerability_id VCID-z7ac-jr58-gkfm
summary
Undici: Malicious WebSocket 64-bit length overflows parser and crashes the client
### Impact
A server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. 

### Patches


 Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

### Workarounds

There are no workarounds.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1528.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1528
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32234
published_at 2026-04-12T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32272
published_at 2026-04-11T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32271
published_at 2026-04-09T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32243
published_at 2026-04-08T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32194
published_at 2026-04-07T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.3237
published_at 2026-04-04T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32332
published_at 2026-04-02T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34153
published_at 2026-04-18T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34129
published_at 2026-04-13T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34167
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1528
2
reference_url https://cna.openjsf.org/security-advisories.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:03:59Z/
url https://cna.openjsf.org/security-advisories.html
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:03:59Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj
5
reference_url https://hackerone.com/reports/3537648
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:03:59Z/
url https://hackerone.com/reports/3537648
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-1528
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-1528
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130883
reference_id 1130883
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130883
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447145
reference_id 2447145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447145
9
reference_url https://github.com/advisories/GHSA-f269-vfmq-vjvj
reference_id GHSA-f269-vfmq-vjvj
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f269-vfmq-vjvj
10
reference_url https://access.redhat.com/errata/RHSA-2026:5807
reference_id RHSA-2026:5807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5807
11
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
12
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
13
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
14
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
15
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
16
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
17
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
18
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
fixed_packages
aliases CVE-2026-1528, GHSA-f269-vfmq-vjvj
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7ac-jr58-gkfm
Fixing_vulnerabilities
Risk_score4.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nodejs24@1:24.14.1-2%3Farch=el10_1