Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/node-fetch@1.7.3-1
purl pkg:deb/debian/node-fetch@1.7.3-1
Next non-vulnerable version 2.6.1-5+deb11u1
Latest non-vulnerable version 2.6.1-5+deb11u1
Risk 4.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-x4yh-ez8g-6ya1
Aliases:
CVE-2022-0235
GHSA-r683-j2x4-v87g
URL Redirection to Untrusted Site ('Open Redirect') node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
2.6.1-5+deb11u1
Affected by 0 other vulnerabilities.
VCID-y5g7-w6ur-8qaq
Aliases:
CVE-2020-15168
GHSA-w7rc-rwvf-8q5r
The `size` option isn't honored after following a redirect in node-fetch ### Impact Node Fetch did not honor the `size` option after following a redirect, which means that when a content size was over the limit, a `FetchError` would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after `fetch()` has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing. ### Patches We released patched versions for both stable and beta channels: - For `v2`: 2.6.1 - For `v3`: 3.0.0-beta.9 ### Workarounds None, it is strongly recommended to update as soon as possible. ### For more information If you have any questions or comments about this advisory: * Open an issue in [node-fetch](https://github.com/node-fetch/node-fetch/issues/new?assignees=&labels=question&template=support-or-usage.md&title=Question%3A+) * Contact one of the core maintainers.
2.6.1-5+deb11u1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-15T21:47:39.181507+00:00 Debian Oval Importer Affected by VCID-x4yh-ez8g-6ya1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:56:52.404795+00:00 Debian Oval Importer Affected by VCID-y5g7-w6ur-8qaq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-11T21:26:14.427446+00:00 Debian Oval Importer Affected by VCID-x4yh-ez8g-6ya1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:42:45.613571+00:00 Debian Oval Importer Affected by VCID-y5g7-w6ur-8qaq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T21:04:43.766406+00:00 Debian Oval Importer Affected by VCID-x4yh-ez8g-6ya1 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:30:07.463164+00:00 Debian Oval Importer Affected by VCID-y5g7-w6ur-8qaq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0