Lookup for vulnerable packages by Package URL.

Purlpkg:npm/undici@4.0.0-rc.2
Typenpm
Namespace
Nameundici
Version4.0.0-rc.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.24.0
Latest_non_vulnerable_version7.24.0
Affected_by_vulnerabilities
0
url VCID-1294-r4v2-3ud7
vulnerability_id VCID-1294-r4v2-3ud7
summary
undici Denial of Service attack via bad certificate data
### Impact

Applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak. 

### Patches

This has been patched in https://github.com/nodejs/undici/pull/4088.

### Workarounds

If a webhook fails, avoid keep calling it repeatedly.

### References

Reported as: https://github.com/nodejs/undici/issues/3895
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47279.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47279.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47279
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14339
published_at 2026-04-16T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14445
published_at 2026-04-13T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14502
published_at 2026-04-12T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14541
published_at 2026-04-11T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14593
published_at 2026-04-09T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14452
published_at 2026-04-07T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.1454
published_at 2026-04-08T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14641
published_at 2026-04-04T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14571
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47279
2
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
3
reference_url https://github.com/nodejs/undici/commit/f317618ec28753a4218beccea048bcf89c36db25
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T17:51:54Z/
url https://github.com/nodejs/undici/commit/f317618ec28753a4218beccea048bcf89c36db25
4
reference_url https://github.com/nodejs/undici/issues/3895
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T17:51:54Z/
url https://github.com/nodejs/undici/issues/3895
5
reference_url https://github.com/nodejs/undici/pull/4088
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T17:51:54Z/
url https://github.com/nodejs/undici/pull/4088
6
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-cxrh-j4jr-qwg3
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T17:51:54Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-cxrh-j4jr-qwg3
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-47279
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-47279
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105860
reference_id 1105860
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105860
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366632
reference_id 2366632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366632
10
reference_url https://github.com/advisories/GHSA-cxrh-j4jr-qwg3
reference_id GHSA-cxrh-j4jr-qwg3
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cxrh-j4jr-qwg3
fixed_packages
0
url pkg:npm/undici@5.29.0
purl pkg:npm/undici@5.29.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgd1-7u6j-p7dh
1
vulnerability VCID-n6ew-t7g1-33gn
2
vulnerability VCID-ph2p-u33d-8yh3
3
vulnerability VCID-sy2z-sqgk-d7hg
4
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.29.0
1
url pkg:npm/undici@6.21.2
purl pkg:npm/undici@6.21.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgd1-7u6j-p7dh
1
vulnerability VCID-n6ew-t7g1-33gn
2
vulnerability VCID-ph2p-u33d-8yh3
3
vulnerability VCID-sy2z-sqgk-d7hg
4
vulnerability VCID-z7ac-jr58-gkfm
5
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@6.21.2
2
url pkg:npm/undici@7.5.0
purl pkg:npm/undici@7.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgd1-7u6j-p7dh
1
vulnerability VCID-n6ew-t7g1-33gn
2
vulnerability VCID-ph2p-u33d-8yh3
3
vulnerability VCID-sy2z-sqgk-d7hg
4
vulnerability VCID-z7ac-jr58-gkfm
5
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@7.5.0
aliases CVE-2025-47279, GHSA-cxrh-j4jr-qwg3
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1294-r4v2-3ud7
1
url VCID-dtvs-pgam-qkbp
vulnerability_id VCID-dtvs-pgam-qkbp
summary
CRLF Injection in Nodejs ‘undici’ via host
Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23936.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23936.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23936
reference_id
reference_type
scores
0
value 0.00536
scoring_system epss
scoring_elements 0.67511
published_at 2026-04-16T12:55:00Z
1
value 0.00536
scoring_system epss
scoring_elements 0.67475
published_at 2026-04-13T12:55:00Z
2
value 0.00536
scoring_system epss
scoring_elements 0.67509
published_at 2026-04-12T12:55:00Z
3
value 0.00536
scoring_system epss
scoring_elements 0.67522
published_at 2026-04-11T12:55:00Z
4
value 0.00536
scoring_system epss
scoring_elements 0.67499
published_at 2026-04-09T12:55:00Z
5
value 0.00536
scoring_system epss
scoring_elements 0.67485
published_at 2026-04-08T12:55:00Z
6
value 0.00602
scoring_system epss
scoring_elements 0.69433
published_at 2026-04-07T12:55:00Z
7
value 0.00727
scoring_system epss
scoring_elements 0.72567
published_at 2026-04-02T12:55:00Z
8
value 0.00727
scoring_system epss
scoring_elements 0.72583
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23936
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/a2eff05401358f6595138df963837c24348f2034
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:48Z/
url https://github.com/nodejs/undici/commit/a2eff05401358f6595138df963837c24348f2034
5
reference_url https://github.com/nodejs/undici/releases/tag/v5.19.1
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:48Z/
url https://github.com/nodejs/undici/releases/tag/v5.19.1
6
reference_url https://hackerone.com/reports/1820955
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:48Z/
url https://hackerone.com/reports/1820955
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031418
reference_id 1031418
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031418
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2172190
reference_id 2172190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2172190
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-23936
reference_id CVE-2023-23936
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-23936
10
reference_url https://github.com/advisories/GHSA-5r9g-qh6m-jxff
reference_id GHSA-5r9g-qh6m-jxff
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5r9g-qh6m-jxff
11
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff
reference_id GHSA-5r9g-qh6m-jxff
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:48Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff
12
reference_url https://access.redhat.com/errata/RHSA-2023:1582
reference_id RHSA-2023:1582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1582
13
reference_url https://access.redhat.com/errata/RHSA-2023:1583
reference_id RHSA-2023:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1583
14
reference_url https://access.redhat.com/errata/RHSA-2023:2654
reference_id RHSA-2023:2654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2654
15
reference_url https://access.redhat.com/errata/RHSA-2023:2655
reference_id RHSA-2023:2655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2655
16
reference_url https://access.redhat.com/errata/RHSA-2023:5533
reference_id RHSA-2023:5533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5533
fixed_packages
0
url pkg:npm/undici@5.19.1
purl pkg:npm/undici@5.19.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-huz5-2qv3-g3an
3
vulnerability VCID-n6ew-t7g1-33gn
4
vulnerability VCID-pah5-gspe-hbbh
5
vulnerability VCID-ph2p-u33d-8yh3
6
vulnerability VCID-sy2z-sqgk-d7hg
7
vulnerability VCID-u8t3-4awy-k3fm
8
vulnerability VCID-xx5u-7mmp-akfs
9
vulnerability VCID-z653-vqsc-euer
10
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.19.1
aliases CVE-2023-23936, GHSA-5r9g-qh6m-jxff
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dtvs-pgam-qkbp
2
url VCID-g4wu-n75v-p7ad
vulnerability_id VCID-g4wu-n75v-p7ad
summary
`undici.request` vulnerable to SSRF using absolute URL on `pathname`
### Impact

`undici` is vulnerable to SSRF (Server-side Request Forgery) when an application takes in **user input** into the `path/pathname` option of `undici.request`.

If a user specifies a URL such as `http://127.0.0.1` or `//127.0.0.1`

```js
const undici = require("undici")
undici.request({origin: "http://example.com", pathname: "//127.0.0.1"})
```

Instead of processing the request as `http://example.org//127.0.0.1` (or `http://example.org/http://127.0.0.1` when `http://127.0.0.1 is used`), it actually processes the request as `http://127.0.0.1/` and sends it to `http://127.0.0.1`.

If a developer passes in user input into `path` parameter of `undici.request`, it can result in an _SSRF_ as they will assume that the hostname cannot change, when in actual fact it can change because the specified path parameter is combined with the base URL.

### Patches

This issue was fixed in `undici@5.8.1`.

### Workarounds

The best workaround is to validate user input before passing it to the `undici.request` call.

## For more information
If you have any questions or comments about this advisory:

- Open an issue in [undici repository](https://github.com/nodejs/undici/issues)
- To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35949.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35949.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35949
reference_id
reference_type
scores
0
value 0.0039
scoring_system epss
scoring_elements 0.60083
published_at 2026-04-16T12:55:00Z
1
value 0.0039
scoring_system epss
scoring_elements 0.60044
published_at 2026-04-13T12:55:00Z
2
value 0.0039
scoring_system epss
scoring_elements 0.60061
published_at 2026-04-12T12:55:00Z
3
value 0.0039
scoring_system epss
scoring_elements 0.60077
published_at 2026-04-11T12:55:00Z
4
value 0.0039
scoring_system epss
scoring_elements 0.60056
published_at 2026-04-09T12:55:00Z
5
value 0.0039
scoring_system epss
scoring_elements 0.60042
published_at 2026-04-08T12:55:00Z
6
value 0.0039
scoring_system epss
scoring_elements 0.59992
published_at 2026-04-07T12:55:00Z
7
value 0.0039
scoring_system epss
scoring_elements 0.60022
published_at 2026-04-04T12:55:00Z
8
value 0.0039
scoring_system epss
scoring_elements 0.59997
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35949
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/124f7ebf705366b2e1844dff721928d270f87895
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:52Z/
url https://github.com/nodejs/undici/commit/124f7ebf705366b2e1844dff721928d270f87895
5
reference_url https://github.com/nodejs/undici/releases/tag/v5.8.2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:52Z/
url https://github.com/nodejs/undici/releases/tag/v5.8.2
6
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-8qr4-xgw6-wmr3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:52Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-8qr4-xgw6-wmr3
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-35949
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-35949
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2121068
reference_id 2121068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2121068
9
reference_url https://github.com/advisories/GHSA-8qr4-xgw6-wmr3
reference_id GHSA-8qr4-xgw6-wmr3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8qr4-xgw6-wmr3
10
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
fixed_packages
0
url pkg:npm/undici@5.8.2
purl pkg:npm/undici@5.8.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-dtvs-pgam-qkbp
2
vulnerability VCID-hgd1-7u6j-p7dh
3
vulnerability VCID-huz5-2qv3-g3an
4
vulnerability VCID-n6ew-t7g1-33gn
5
vulnerability VCID-pah5-gspe-hbbh
6
vulnerability VCID-ph2p-u33d-8yh3
7
vulnerability VCID-sy2z-sqgk-d7hg
8
vulnerability VCID-u8t3-4awy-k3fm
9
vulnerability VCID-vh17-44d1-kyf7
10
vulnerability VCID-xx5u-7mmp-akfs
11
vulnerability VCID-z653-vqsc-euer
12
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.8.2
aliases CVE-2022-35949, GHSA-8qr4-xgw6-wmr3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4wu-n75v-p7ad
3
url VCID-hgd1-7u6j-p7dh
vulnerability_id VCID-hgd1-7u6j-p7dh
summary
Undici has Unhandled Exception in WebSocket Client Due to Invalid server_max_window_bits Validation
### Impact

The undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the `server_max_window_bits` parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically advertises support for permessage-deflate compression. A malicious server can respond with an out-of-range `server_max_window_bits` value (outside zlib's valid range of 8-15). When the server subsequently sends a compressed frame, the client attempts to create a zlib InflateRaw instance with the invalid windowBits value, causing a synchronous RangeError exception that is not caught, resulting in immediate process termination.

The vulnerability exists because:

1. The `isValidClientWindowBits()` function only validates that the value contains ASCII digits, not that it falls within the valid range 8-15
2. The `createInflateRaw()` call is not wrapped in a try-catch block
3. The resulting exception propagates up through the call stack and crashes the Node.js process

### Patches
_Has the problem been patched? What versions should users upgrade to?_

### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2229.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-2229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-2229
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40468
published_at 2026-04-02T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40417
published_at 2026-04-07T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40494
published_at 2026-04-04T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40462
published_at 2026-04-12T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40499
published_at 2026-04-11T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40478
published_at 2026-04-09T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40467
published_at 2026-04-08T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.42413
published_at 2026-04-13T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42462
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-2229
2
reference_url https://cna.openjsf.org/security-advisories.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/
url https://cna.openjsf.org/security-advisories.html
3
reference_url https://datatracker.ietf.org/doc/html/rfc7692
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/
url https://datatracker.ietf.org/doc/html/rfc7692
4
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
5
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-v9p9-hfj2-hcw8
6
reference_url https://hackerone.com/reports/3487486
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/
url https://hackerone.com/reports/3487486
7
reference_url https://nodejs.org/api/zlib.html#class-zlibinflateraw
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T13:06:30Z/
url https://nodejs.org/api/zlib.html#class-zlibinflateraw
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-2229
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-2229
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130884
reference_id 1130884
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130884
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447143
reference_id 2447143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447143
11
reference_url https://github.com/advisories/GHSA-v9p9-hfj2-hcw8
reference_id GHSA-v9p9-hfj2-hcw8
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v9p9-hfj2-hcw8
12
reference_url https://access.redhat.com/errata/RHSA-2026:5807
reference_id RHSA-2026:5807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5807
13
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
14
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
15
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
16
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
17
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
18
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
19
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
20
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
fixed_packages
0
url pkg:npm/undici@6.24.0
purl pkg:npm/undici@6.24.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@6.24.0
1
url pkg:npm/undici@7.24.0
purl pkg:npm/undici@7.24.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@7.24.0
aliases CVE-2026-2229, GHSA-v9p9-hfj2-hcw8
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgd1-7u6j-p7dh
4
url VCID-huz5-2qv3-g3an
vulnerability_id VCID-huz5-2qv3-g3an
summary
Exposure of Sensitive Information to an Unauthorized Actor
Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but does not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45143.json
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45143
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28731
published_at 2026-04-02T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28779
published_at 2026-04-04T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28586
published_at 2026-04-07T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28622
published_at 2026-04-16T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28602
published_at 2026-04-13T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28649
published_at 2026-04-12T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28652
published_at 2026-04-08T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28693
published_at 2026-04-11T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28692
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45143
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76
5
reference_url https://github.com/nodejs/undici/releases/tag/v5.26.2
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://github.com/nodejs/undici/releases/tag/v5.26.2
6
reference_url https://hackerone.com/reports/2166948
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://hackerone.com/reports/2166948
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053879
reference_id 1053879
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053879
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2244104
reference_id 2244104
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2244104
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
reference_id 3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-45143
reference_id CVE-2023-45143
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-45143
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
reference_id E72T67UPDRXHIDLO3OROR25YAMN4GGW5
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
reference_id FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
19
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp
reference_id GHSA-q768-x9m6-m9qp
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp
20
reference_url https://github.com/advisories/GHSA-wqq4-5wpv-mx2g
reference_id GHSA-wqq4-5wpv-mx2g
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wqq4-5wpv-mx2g
21
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g
reference_id GHSA-wqq4-5wpv-mx2g
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g
22
reference_url https://security.gentoo.org/glsa/202505-11
reference_id GLSA-202505-11
reference_type
scores
url https://security.gentoo.org/glsa/202505-11
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
reference_id HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
reference_id LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
25
reference_url https://access.redhat.com/errata/RHSA-2023:5849
reference_id RHSA-2023:5849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5849
26
reference_url https://access.redhat.com/errata/RHSA-2023:5869
reference_id RHSA-2023:5869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5869
27
reference_url https://access.redhat.com/errata/RHSA-2023:7205
reference_id RHSA-2023:7205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7205
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
reference_id X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:10:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
fixed_packages
0
url pkg:npm/undici@5.26.2
purl pkg:npm/undici@5.26.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-pah5-gspe-hbbh
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-u8t3-4awy-k3fm
7
vulnerability VCID-xx5u-7mmp-akfs
8
vulnerability VCID-z653-vqsc-euer
9
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.26.2
aliases CVE-2023-45143, GHSA-wqq4-5wpv-mx2g
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-huz5-2qv3-g3an
5
url VCID-n6ew-t7g1-33gn
vulnerability_id VCID-n6ew-t7g1-33gn
summary
Undici has an HTTP Request/Response Smuggling issue
### Impact

Undici allows duplicate HTTP `Content-Length` headers when they are provided in an array with case-variant names (e.g., `Content-Length` and `content-length`). This produces malformed HTTP/1.1 requests with multiple conflicting `Content-Length` values on the wire.

**Who is impacted:**
  - Applications using `undici.request()`, `undici.Client`, or similar low-level APIs with headers passed as flat arrays
  - Applications that accept user-controlled header names without case-normalization

**Potential consequences:**
  - **Denial of Service**: Strict HTTP parsers (proxies, servers) will reject requests with duplicate `Content-Length` headers (400 Bad Request)
  - **HTTP Request Smuggling**: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking

### Patches

 Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

### Workarounds

  If upgrading is not immediately possible:

  1. **Validate header names**: Ensure no duplicate `Content-Length` headers (case-insensitive) are present before passing headers to undici
  2. **Use object format**: Pass headers as a plain object (`{ 'content-length': '123' }`) rather than an array, which naturally deduplicates by key
  3. **Sanitize user input**: If headers originate from user input, normalize header names to lowercase and reject duplicates
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1525.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1525
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03768
published_at 2026-04-07T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03756
published_at 2026-04-11T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03795
published_at 2026-04-09T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03771
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03742
published_at 2026-04-02T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03754
published_at 2026-04-04T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03735
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04422
published_at 2026-04-16T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04453
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1525
2
reference_url https://cna.openjsf.org/security-advisories.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/
url https://cna.openjsf.org/security-advisories.html
3
reference_url https://cwe.mitre.org/data/definitions/444.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/
url https://cwe.mitre.org/data/definitions/444.html
4
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
5
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-2mjp-6q6p-2qxm
6
reference_url https://hackerone.com/reports/3556037
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/
url https://hackerone.com/reports/3556037
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-1525
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-1525
8
reference_url https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-12T20:44:24Z/
url https://www.rfc-editor.org/rfc/rfc9110.html#section-8.6
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130879
reference_id 1130879
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130879
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447144
reference_id 2447144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447144
11
reference_url https://github.com/advisories/GHSA-2mjp-6q6p-2qxm
reference_id GHSA-2mjp-6q6p-2qxm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2mjp-6q6p-2qxm
12
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
13
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
14
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
15
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
16
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
17
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
18
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
19
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
fixed_packages
0
url pkg:npm/undici@6.24.0
purl pkg:npm/undici@6.24.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@6.24.0
1
url pkg:npm/undici@7.24.0
purl pkg:npm/undici@7.24.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@7.24.0
aliases CVE-2026-1525, GHSA-2mjp-6q6p-2qxm
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n6ew-t7g1-33gn
6
url VCID-ph2p-u33d-8yh3
vulnerability_id VCID-ph2p-u33d-8yh3
summary
Undici has CRLF Injection in undici via `upgrade` option
### Impact

When an application passes user-controlled input to the `upgrade` option of `client.request()`, an attacker can inject CRLF sequences (`\r\n`) to:

1. Inject arbitrary HTTP headers
2. Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)

The vulnerability exists because undici writes the `upgrade` value directly to the socket without validating for invalid header characters:

```javascript
// lib/dispatcher/client-h1.js:1121
if (upgrade) {
  header += `connection: upgrade\r\nupgrade: ${upgrade}\r\n`
}
```

### Patches

 Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

### Workarounds

Sanitize the `upgrade` option string before passing to undici:

```javascript
function sanitizeUpgrade(value) {
  if (/[\r\n]/.test(value)) {
    throw new Error('Invalid upgrade value')
  }
  return value
}

client.request({
  upgrade: sanitizeUpgrade(userInput)
})
```
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1527.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1527
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01228
published_at 2026-04-16T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01235
published_at 2026-04-13T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00954
published_at 2026-04-08T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.0095
published_at 2026-04-09T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00946
published_at 2026-04-04T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00934
published_at 2026-04-12T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00938
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1527
2
reference_url https://cna.openjsf.org/security-advisories.html
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:05:24Z/
url https://cna.openjsf.org/security-advisories.html
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:05:24Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-4992-7rv2-5pvq
5
reference_url https://hackerone.com/reports/3487198
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:05:24Z/
url https://hackerone.com/reports/3487198
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-1527
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-1527
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130882
reference_id 1130882
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130882
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447141
reference_id 2447141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447141
9
reference_url https://github.com/advisories/GHSA-4992-7rv2-5pvq
reference_id GHSA-4992-7rv2-5pvq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4992-7rv2-5pvq
10
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
11
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
12
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
fixed_packages
0
url pkg:npm/undici@6.24.0
purl pkg:npm/undici@6.24.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@6.24.0
1
url pkg:npm/undici@7.24.0
purl pkg:npm/undici@7.24.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@7.24.0
aliases CVE-2026-1527, GHSA-4992-7rv2-5pvq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph2p-u33d-8yh3
7
url VCID-rskk-s95c-rfgz
vulnerability_id VCID-rskk-s95c-rfgz
summary
Nodejs ‘undici’ vulnerable to CRLF Injection via Content-Type
### Impact

`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header.

Example:

```
import { request } from 'undici'

const unsanitizedContentTypeInput =  'application/json\r\n\r\nGET /foo2 HTTP/1.1'

await request('http://localhost:3000, {
    method: 'GET',
    headers: {
      'content-type': unsanitizedContentTypeInput
    },
})
```

The above snippet will perform two requests in a single `request` API call:

1) `http://localhost:3000/`
2) `http://localhost:3000/foo2`

### Patches

This issue was patched in Undici v5.8.1

### Workarounds

Sanitize input when sending content-type headers using user input.

## For more information
If you have any questions or comments about this advisory:

- Open an issue in [undici repository](https://github.com/nodejs/undici/issues)
- To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35948.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35948.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35948
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37421
published_at 2026-04-13T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37448
published_at 2026-04-12T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37482
published_at 2026-04-11T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37468
published_at 2026-04-16T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37455
published_at 2026-04-08T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37404
published_at 2026-04-07T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37576
published_at 2026-04-04T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37552
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35948
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/66165d604fd0aee70a93ed5c44ad4cc2df395f80
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:48Z/
url https://github.com/nodejs/undici/commit/66165d604fd0aee70a93ed5c44ad4cc2df395f80
5
reference_url https://github.com/nodejs/undici/releases/tag/v5.8.2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:48Z/
url https://github.com/nodejs/undici/releases/tag/v5.8.2
6
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-f772-66g8-q5h3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:48Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-f772-66g8-q5h3
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-35948
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-35948
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2121101
reference_id 2121101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2121101
9
reference_url https://github.com/advisories/GHSA-f772-66g8-q5h3
reference_id GHSA-f772-66g8-q5h3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f772-66g8-q5h3
10
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
fixed_packages
0
url pkg:npm/undici@5.8.2
purl pkg:npm/undici@5.8.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-dtvs-pgam-qkbp
2
vulnerability VCID-hgd1-7u6j-p7dh
3
vulnerability VCID-huz5-2qv3-g3an
4
vulnerability VCID-n6ew-t7g1-33gn
5
vulnerability VCID-pah5-gspe-hbbh
6
vulnerability VCID-ph2p-u33d-8yh3
7
vulnerability VCID-sy2z-sqgk-d7hg
8
vulnerability VCID-u8t3-4awy-k3fm
9
vulnerability VCID-vh17-44d1-kyf7
10
vulnerability VCID-xx5u-7mmp-akfs
11
vulnerability VCID-z653-vqsc-euer
12
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.8.2
aliases CVE-2022-35948, GHSA-f772-66g8-q5h3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rskk-s95c-rfgz
8
url VCID-sy2z-sqgk-d7hg
vulnerability_id VCID-sy2z-sqgk-d7hg
summary
Undici has Unbounded Memory Consumption in WebSocket permessage-deflate Decompression
## Description

The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incoming compressed frames without enforcing any limit on the decompressed data size. A malicious WebSocket server can send a small compressed frame (a "decompression bomb") that expands to an extremely large size in memory, causing the Node.js process to exhaust available memory and crash or become unresponsive.

The vulnerability exists in the `PerMessageDeflate.decompress()` method, which accumulates all decompressed chunks in memory and concatenates them into a single Buffer without checking whether the total size exceeds a safe threshold.

## Impact

- Remote denial of service against any Node.js application using undici's WebSocket client
- A single compressed WebSocket frame of ~6 MB can decompress to ~1 GB or more
- Memory exhaustion occurs in native/external memory, bypassing V8 heap limits
- No application-level mitigation is possible as decompression occurs before message delivery

### Patches

Users should upgrade to fixed versions.

### Workarounds

No workaround are possible.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1526.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1526.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1526
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04824
published_at 2026-04-07T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04808
published_at 2026-04-04T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04834
published_at 2026-04-12T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04857
published_at 2026-04-11T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.0488
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04862
published_at 2026-04-08T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05394
published_at 2026-04-13T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05343
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1526
2
reference_url https://cna.openjsf.org/security-advisories.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/
url https://cna.openjsf.org/security-advisories.html
3
reference_url https://datatracker.ietf.org/doc/html/rfc7692
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/
url https://datatracker.ietf.org/doc/html/rfc7692
4
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
5
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-vrm6-8vpv-qv8q
6
reference_url https://hackerone.com/reports/3481206
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-13T18:04:06Z/
url https://hackerone.com/reports/3481206
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-1526
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-1526
8
reference_url https://owasp.org/www-community/attacks/Denial_of_Service
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://owasp.org/www-community/attacks/Denial_of_Service
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130880
reference_id 1130880
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130880
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447142
reference_id 2447142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447142
11
reference_url https://github.com/advisories/GHSA-vrm6-8vpv-qv8q
reference_id GHSA-vrm6-8vpv-qv8q
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vrm6-8vpv-qv8q
12
reference_url https://access.redhat.com/errata/RHSA-2026:5807
reference_id RHSA-2026:5807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5807
13
reference_url https://access.redhat.com/errata/RHSA-2026:7080
reference_id RHSA-2026:7080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7080
14
reference_url https://access.redhat.com/errata/RHSA-2026:7123
reference_id RHSA-2026:7123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7123
15
reference_url https://access.redhat.com/errata/RHSA-2026:7302
reference_id RHSA-2026:7302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7302
16
reference_url https://access.redhat.com/errata/RHSA-2026:7310
reference_id RHSA-2026:7310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7310
17
reference_url https://access.redhat.com/errata/RHSA-2026:7350
reference_id RHSA-2026:7350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7350
18
reference_url https://access.redhat.com/errata/RHSA-2026:7670
reference_id RHSA-2026:7670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7670
19
reference_url https://access.redhat.com/errata/RHSA-2026:7675
reference_id RHSA-2026:7675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7675
20
reference_url https://access.redhat.com/errata/RHSA-2026:7983
reference_id RHSA-2026:7983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7983
fixed_packages
0
url pkg:npm/undici@6.24.0
purl pkg:npm/undici@6.24.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@6.24.0
1
url pkg:npm/undici@7.24.0
purl pkg:npm/undici@7.24.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@7.24.0
aliases CVE-2026-1526, GHSA-vrm6-8vpv-qv8q
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sy2z-sqgk-d7hg
9
url VCID-u8t3-4awy-k3fm
vulnerability_id VCID-u8t3-4awy-k3fm
summary
Undici's Proxy-Authorization header not cleared on cross-origin redirect for dispatch, request, stream, pipeline
### Impact

Undici cleared Authorization and Proxy-Authorization headers for `fetch()`, but did not clear them for `undici.request()`.

### Patches

This has been patched in https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75.
Fixes has been released in v5.28.4 and v6.11.1.

### Workarounds

use `fetch()` or disable `maxRedirections`.

### References

Linzi Shang reported this.

* https://hackerone.com/reports/2408074
* https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-30260.json
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-30260.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-30260
reference_id
reference_type
scores
0
value 0.00177
scoring_system epss
scoring_elements 0.3936
published_at 2026-04-16T12:55:00Z
1
value 0.00177
scoring_system epss
scoring_elements 0.39307
published_at 2026-04-13T12:55:00Z
2
value 0.00177
scoring_system epss
scoring_elements 0.39326
published_at 2026-04-12T12:55:00Z
3
value 0.00177
scoring_system epss
scoring_elements 0.39365
published_at 2026-04-11T12:55:00Z
4
value 0.00177
scoring_system epss
scoring_elements 0.39353
published_at 2026-04-09T12:55:00Z
5
value 0.00177
scoring_system epss
scoring_elements 0.39336
published_at 2026-04-08T12:55:00Z
6
value 0.00177
scoring_system epss
scoring_elements 0.39367
published_at 2026-04-04T12:55:00Z
7
value 0.00177
scoring_system epss
scoring_elements 0.39281
published_at 2026-04-07T12:55:00Z
8
value 0.00177
scoring_system epss
scoring_elements 0.39344
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-30260
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:43:37Z/
url https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f
5
reference_url https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:43:37Z/
url https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75
6
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:43:37Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7
7
reference_url https://hackerone.com/reports/2408074
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/2408074
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-30260
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-30260
12
reference_url https://security.netapp.com/advisory/ntap-20240905-0008
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240905-0008
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2273522
reference_id 2273522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2273522
14
reference_url https://github.com/advisories/GHSA-m4v8-wqvr-p9f7
reference_id GHSA-m4v8-wqvr-p9f7
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-m4v8-wqvr-p9f7
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/
reference_id HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:43:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/
reference_id NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:43:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/
reference_id P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:43:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/
18
reference_url https://access.redhat.com/errata/RHSA-2024:6667
reference_id RHSA-2024:6667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6667
fixed_packages
0
url pkg:npm/undici@5.28.4
purl pkg:npm/undici@5.28.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-pah5-gspe-hbbh
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.28.4
1
url pkg:npm/undici@6.11.1
purl pkg:npm/undici@6.11.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-pah5-gspe-hbbh
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-z7ac-jr58-gkfm
7
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@6.11.1
aliases CVE-2024-30260, GHSA-m4v8-wqvr-p9f7
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u8t3-4awy-k3fm
10
url VCID-vh17-44d1-kyf7
vulnerability_id VCID-vh17-44d1-kyf7
summary
Regular Expression Denial of Service in Headers
Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods is vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24807.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-24807
reference_id
reference_type
scores
0
value 0.00305
scoring_system epss
scoring_elements 0.53772
published_at 2026-04-16T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.53735
published_at 2026-04-13T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53751
published_at 2026-04-12T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53768
published_at 2026-04-11T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.5372
published_at 2026-04-09T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.53669
published_at 2026-04-07T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53701
published_at 2026-04-04T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.53674
published_at 2026-04-02T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.53722
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-24807
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:58:28Z/
url https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf
5
reference_url https://github.com/nodejs/undici/releases/tag/v5.19.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:58:28Z/
url https://github.com/nodejs/undici/releases/tag/v5.19.1
6
reference_url https://hackerone.com/bugs?report_id=1784449
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:58:28Z/
url https://hackerone.com/bugs?report_id=1784449
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031418
reference_id 1031418
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031418
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2172204
reference_id 2172204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2172204
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-24807
reference_id CVE-2023-24807
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-24807
10
reference_url https://github.com/advisories/GHSA-r6ch-mqf9-qc9w
reference_id GHSA-r6ch-mqf9-qc9w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r6ch-mqf9-qc9w
11
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w
reference_id GHSA-r6ch-mqf9-qc9w
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:58:28Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w
12
reference_url https://access.redhat.com/errata/RHSA-2023:1582
reference_id RHSA-2023:1582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1582
13
reference_url https://access.redhat.com/errata/RHSA-2023:1583
reference_id RHSA-2023:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1583
14
reference_url https://access.redhat.com/errata/RHSA-2023:2654
reference_id RHSA-2023:2654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2654
15
reference_url https://access.redhat.com/errata/RHSA-2023:2655
reference_id RHSA-2023:2655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2655
16
reference_url https://access.redhat.com/errata/RHSA-2023:5533
reference_id RHSA-2023:5533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5533
fixed_packages
0
url pkg:npm/undici@5.19.1
purl pkg:npm/undici@5.19.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-huz5-2qv3-g3an
3
vulnerability VCID-n6ew-t7g1-33gn
4
vulnerability VCID-pah5-gspe-hbbh
5
vulnerability VCID-ph2p-u33d-8yh3
6
vulnerability VCID-sy2z-sqgk-d7hg
7
vulnerability VCID-u8t3-4awy-k3fm
8
vulnerability VCID-xx5u-7mmp-akfs
9
vulnerability VCID-z653-vqsc-euer
10
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.19.1
aliases CVE-2023-24807, GHSA-r6ch-mqf9-qc9w
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh17-44d1-kyf7
11
url VCID-wqk1-vxt3-j3bb
vulnerability_id VCID-wqk1-vxt3-j3bb
summary
undici before v5.8.0 vulnerable to CRLF injection in request headers
### Impact

It is possible to inject CRLF sequences into request headers in Undici.

```js
const undici = require('undici')

const response = undici.request("http://127.0.0.1:1000", {
  headers: {'a': "\r\nb"}
})
```

The same applies to `path` and `method`

### Patches

Update to v5.8.0

### Workarounds

Sanitize all HTTP headers from untrusted sources to eliminate `\r\n`.

### References

https://hackerone.com/reports/409943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12116

### For more information

If you have any questions or comments about this advisory:

* Open an issue in [undici repository](https://github.com/nodejs/undici/issues)
* To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31150.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31150
reference_id
reference_type
scores
0
value 0.00507
scoring_system epss
scoring_elements 0.66282
published_at 2026-04-16T12:55:00Z
1
value 0.00507
scoring_system epss
scoring_elements 0.66247
published_at 2026-04-13T12:55:00Z
2
value 0.00507
scoring_system epss
scoring_elements 0.66278
published_at 2026-04-12T12:55:00Z
3
value 0.00507
scoring_system epss
scoring_elements 0.66291
published_at 2026-04-11T12:55:00Z
4
value 0.00507
scoring_system epss
scoring_elements 0.66271
published_at 2026-04-09T12:55:00Z
5
value 0.00507
scoring_system epss
scoring_elements 0.66258
published_at 2026-04-08T12:55:00Z
6
value 0.00507
scoring_system epss
scoring_elements 0.6621
published_at 2026-04-07T12:55:00Z
7
value 0.00507
scoring_system epss
scoring_elements 0.6624
published_at 2026-04-04T12:55:00Z
8
value 0.00507
scoring_system epss
scoring_elements 0.66213
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31150
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/a29a151d0140d095742d21a004023d024fe93259
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici/commit/a29a151d0140d095742d21a004023d024fe93259
5
reference_url https://github.com/nodejs/undici/releases/tag/v5.8.0
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:40:20Z/
url https://github.com/nodejs/undici/releases/tag/v5.8.0
6
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-3cvr-822r-rqcc
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:40:20Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-3cvr-822r-rqcc
7
reference_url https://hackerone.com/reports/409943
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:40:20Z/
url https://hackerone.com/reports/409943
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31150
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31150
9
reference_url https://security.netapp.com/advisory/ntap-20220915-0002
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220915-0002
10
reference_url https://security.netapp.com/advisory/ntap-20220915-0002/
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:40:20Z/
url https://security.netapp.com/advisory/ntap-20220915-0002/
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2109354
reference_id 2109354
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2109354
12
reference_url https://github.com/advisories/GHSA-3cvr-822r-rqcc
reference_id GHSA-3cvr-822r-rqcc
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3cvr-822r-rqcc
fixed_packages
0
url pkg:npm/undici@5.8.0
purl pkg:npm/undici@5.8.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-dtvs-pgam-qkbp
2
vulnerability VCID-g4wu-n75v-p7ad
3
vulnerability VCID-hgd1-7u6j-p7dh
4
vulnerability VCID-huz5-2qv3-g3an
5
vulnerability VCID-n6ew-t7g1-33gn
6
vulnerability VCID-pah5-gspe-hbbh
7
vulnerability VCID-ph2p-u33d-8yh3
8
vulnerability VCID-rskk-s95c-rfgz
9
vulnerability VCID-sy2z-sqgk-d7hg
10
vulnerability VCID-u8t3-4awy-k3fm
11
vulnerability VCID-vh17-44d1-kyf7
12
vulnerability VCID-xx5u-7mmp-akfs
13
vulnerability VCID-z653-vqsc-euer
14
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.8.0
aliases CVE-2022-31150, GHSA-3cvr-822r-rqcc
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqk1-vxt3-j3bb
12
url VCID-x5np-z1be-m7gq
vulnerability_id VCID-x5np-z1be-m7gq
summary
undici before v5.8.0 vulnerable to uncleared cookies on cross-host / cross-origin redirect
### Impact

Authorization headers are already cleared on cross-origin redirect in
https://github.com/nodejs/undici/blob/main/lib/handler/redirect.js#L189, based on https://github.com/nodejs/undici/issues/872.

However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There also has been active discussion of implementing a cookie store https://github.com/nodejs/undici/pull/1441, which suggests that there are active users using cookie headers in undici.
As such this may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site.

### Patches

This was patched in v5.8.0.

### Workarounds

By default, this vulnerability is not exploitable.
Do not enable redirections, i.e. `maxRedirections: 0` (the default). 

### References

https://hackerone.com/reports/1635514
https://curl.se/docs/CVE-2018-1000007.html
https://curl.se/docs/CVE-2022-27776.html

### For more information
If you have any questions or comments about this advisory:
* Open an issue in [undici repository](https://github.com/nodejs/undici/issues)
* To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31151.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31151
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30745
published_at 2026-04-16T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30722
published_at 2026-04-13T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30768
published_at 2026-04-12T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30812
published_at 2026-04-11T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30811
published_at 2026-04-09T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30721
published_at 2026-04-07T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30901
published_at 2026-04-04T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30854
published_at 2026-04-02T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30779
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31151
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/blob/main/lib/handler/redirect.js#L189
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici/blob/main/lib/handler/redirect.js#L189
5
reference_url https://github.com/nodejs/undici/commit/0a5bee9465e627be36bac88edf7d9bbc9626126d
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici/commit/0a5bee9465e627be36bac88edf7d9bbc9626126d
6
reference_url https://github.com/nodejs/undici/issues/872
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:24Z/
url https://github.com/nodejs/undici/issues/872
7
reference_url https://github.com/nodejs/undici/pull/1441
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici/pull/1441
8
reference_url https://github.com/nodejs/undici/releases/tag/v5.8.0
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici/releases/tag/v5.8.0
9
reference_url https://hackerone.com/reports/1635514
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:24Z/
url https://hackerone.com/reports/1635514
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31151
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31151
11
reference_url https://security.netapp.com/advisory/ntap-20220909-0006
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220909-0006
12
reference_url https://security.netapp.com/advisory/ntap-20220909-0006/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:24Z/
url https://security.netapp.com/advisory/ntap-20220909-0006/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2121396
reference_id 2121396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2121396
14
reference_url https://github.com/advisories/GHSA-q768-x9m6-m9qp
reference_id GHSA-q768-x9m6-m9qp
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q768-x9m6-m9qp
15
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp
reference_id GHSA-q768-x9m6-m9qp
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:24Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp
fixed_packages
0
url pkg:npm/undici@5.8.0
purl pkg:npm/undici@5.8.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-dtvs-pgam-qkbp
2
vulnerability VCID-g4wu-n75v-p7ad
3
vulnerability VCID-hgd1-7u6j-p7dh
4
vulnerability VCID-huz5-2qv3-g3an
5
vulnerability VCID-n6ew-t7g1-33gn
6
vulnerability VCID-pah5-gspe-hbbh
7
vulnerability VCID-ph2p-u33d-8yh3
8
vulnerability VCID-rskk-s95c-rfgz
9
vulnerability VCID-sy2z-sqgk-d7hg
10
vulnerability VCID-u8t3-4awy-k3fm
11
vulnerability VCID-vh17-44d1-kyf7
12
vulnerability VCID-xx5u-7mmp-akfs
13
vulnerability VCID-z653-vqsc-euer
14
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.8.0
aliases CVE-2022-31151, GHSA-q768-x9m6-m9qp
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5np-z1be-m7gq
13
url VCID-xx5u-7mmp-akfs
vulnerability_id VCID-xx5u-7mmp-akfs
summary
Undici proxy-authorization header not cleared on cross-origin redirect in fetch
### Impact

Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Proxy-Authorization` headers. 

### Patches

This is patched in v5.28.3 and v6.6.1

### Workarounds

There are no known workarounds.

### References

- https://fetch.spec.whatwg.org/#authentication-entries
- https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24758.json
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24758.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24758
reference_id
reference_type
scores
0
value 0.00278
scoring_system epss
scoring_elements 0.51277
published_at 2026-04-16T12:55:00Z
1
value 0.00278
scoring_system epss
scoring_elements 0.51195
published_at 2026-04-02T12:55:00Z
2
value 0.00278
scoring_system epss
scoring_elements 0.51221
published_at 2026-04-04T12:55:00Z
3
value 0.00278
scoring_system epss
scoring_elements 0.51179
published_at 2026-04-07T12:55:00Z
4
value 0.00278
scoring_system epss
scoring_elements 0.51234
published_at 2026-04-08T12:55:00Z
5
value 0.00278
scoring_system epss
scoring_elements 0.51231
published_at 2026-04-09T12:55:00Z
6
value 0.00278
scoring_system epss
scoring_elements 0.51275
published_at 2026-04-11T12:55:00Z
7
value 0.00278
scoring_system epss
scoring_elements 0.51254
published_at 2026-04-12T12:55:00Z
8
value 0.00278
scoring_system epss
scoring_elements 0.5124
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24758
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/b9da3e40f1f096a06b4caedbb27c2568730434ef
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:56:27Z/
url https://github.com/nodejs/undici/commit/b9da3e40f1f096a06b4caedbb27c2568730434ef
5
reference_url https://github.com/nodejs/undici/commit/d3aa574b1259c1d8d329a0f0f495ee82882b1458
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici/commit/d3aa574b1259c1d8d329a0f0f495ee82882b1458
6
reference_url https://github.com/nodejs/undici/releases/tag/v5.28.3
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici/releases/tag/v5.28.3
7
reference_url https://github.com/nodejs/undici/releases/tag/v6.6.1
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici/releases/tag/v6.6.1
8
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:56:27Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-24758
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-24758
10
reference_url https://security.netapp.com/advisory/ntap-20240419-0007
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240419-0007
11
reference_url http://www.openwall.com/lists/oss-security/2024/03/11/1
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:56:27Z/
url http://www.openwall.com/lists/oss-security/2024/03/11/1
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064312
reference_id 1064312
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064312
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2264730
reference_id 2264730
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2264730
14
reference_url https://github.com/advisories/GHSA-3787-6prv-h9w3
reference_id GHSA-3787-6prv-h9w3
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3787-6prv-h9w3
15
reference_url https://security.netapp.com/advisory/ntap-20240419-0007/
reference_id ntap-20240419-0007
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-22T16:56:27Z/
url https://security.netapp.com/advisory/ntap-20240419-0007/
fixed_packages
0
url pkg:npm/undici@5.28.3
purl pkg:npm/undici@5.28.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-pah5-gspe-hbbh
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-u8t3-4awy-k3fm
7
vulnerability VCID-z653-vqsc-euer
8
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.28.3
1
url pkg:npm/undici@6.6.1
purl pkg:npm/undici@6.6.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-pah5-gspe-hbbh
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-u8t3-4awy-k3fm
7
vulnerability VCID-z653-vqsc-euer
8
vulnerability VCID-z7ac-jr58-gkfm
9
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@6.6.1
aliases CVE-2024-24758, GHSA-3787-6prv-h9w3
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xx5u-7mmp-akfs
14
url VCID-z653-vqsc-euer
vulnerability_id VCID-z653-vqsc-euer
summary
Undici's fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect
### Impact

If an attacker can alter the `integrity` option passed to `fetch()`, they can let `fetch()` accept requests as valid even if they have been tampered.

### Patches

Fixed in https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3.
Fixes has been released in v5.28.4 and v6.11.1.


### Workarounds

Ensure that `integrity` cannot be tampered with.

### References

https://hackerone.com/reports/2377760
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-30261.json
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-30261.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-30261
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18619
published_at 2026-04-16T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18671
published_at 2026-04-13T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18721
published_at 2026-04-12T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18768
published_at 2026-04-11T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18763
published_at 2026-04-09T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18709
published_at 2026-04-08T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.1863
published_at 2026-04-07T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18909
published_at 2026-04-04T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18856
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-30261
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-04T15:04:42Z/
url https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055
5
reference_url https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-04T15:04:42Z/
url https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3
6
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system cvssv3.1_qr
scoring_elements
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-04T15:04:42Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672
7
reference_url https://hackerone.com/reports/2377760
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-04T15:04:42Z/
url https://hackerone.com/reports/2377760
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-30261
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-30261
12
reference_url https://security.netapp.com/advisory/ntap-20240905-0008
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240905-0008
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2273519
reference_id 2273519
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2273519
14
reference_url https://github.com/advisories/GHSA-9qxr-qj54-h672
reference_id GHSA-9qxr-qj54-h672
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9qxr-qj54-h672
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/
reference_id HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-04T15:04:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/
reference_id NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-04T15:04:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/
reference_id P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E
reference_type
scores
0
value 2.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-04T15:04:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/
18
reference_url https://access.redhat.com/errata/RHSA-2024:6667
reference_id RHSA-2024:6667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6667
19
reference_url https://access.redhat.com/errata/RHSA-2025:1931
reference_id RHSA-2025:1931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1931
fixed_packages
0
url pkg:npm/undici@5.28.4
purl pkg:npm/undici@5.28.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-pah5-gspe-hbbh
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@5.28.4
1
url pkg:npm/undici@6.11.1
purl pkg:npm/undici@6.11.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-pah5-gspe-hbbh
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-z7ac-jr58-gkfm
7
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@6.11.1
aliases CVE-2024-30261, GHSA-9qxr-qj54-h672
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z653-vqsc-euer
15
url VCID-zb3h-efqz-dff3
vulnerability_id VCID-zb3h-efqz-dff3
summary
Undici has an unbounded decompression chain in HTTP responses on Node.js Fetch API via Content-Encoding leads to resource exhaustion
### Impact

The `fetch()` API supports chained HTTP encoding algorithms for response content according to RFC 9110 (e.g., Content-Encoding: gzip, br). This is also supported by the undici decompress interceptor.

However, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation.

### Patches

Upgrade to 7.18.2 or 6.23.0.

### Workarounds

It is possible to apply an undici interceptor and filter long `Content-Encoding` sequences manually.

### References

* https://hackerone.com/reports/3456148
* https://github.com/advisories/GHSA-gm62-xv2j-4w53
* https://curl.se/docs/CVE-2022-32206.html
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22036.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22036.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22036
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05385
published_at 2026-04-16T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05433
published_at 2026-04-13T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05439
published_at 2026-04-12T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05453
published_at 2026-04-11T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05482
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.0546
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05425
published_at 2026-04-07T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05386
published_at 2026-04-02T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05418
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22036
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/b04e3cbb569c1596f86c108e9b52c79d8475dcb3
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:17:52Z/
url https://github.com/nodejs/undici/commit/b04e3cbb569c1596f86c108e9b52c79d8475dcb3
5
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-g9mf-h72j-4rw9
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:17:52Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-g9mf-h72j-4rw9
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-22036
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-22036
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125679
reference_id 1125679
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125679
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429741
reference_id 2429741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429741
9
reference_url https://github.com/advisories/GHSA-g9mf-h72j-4rw9
reference_id GHSA-g9mf-h72j-4rw9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g9mf-h72j-4rw9
fixed_packages
0
url pkg:npm/undici@6.23.0
purl pkg:npm/undici@6.23.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgd1-7u6j-p7dh
1
vulnerability VCID-n6ew-t7g1-33gn
2
vulnerability VCID-ph2p-u33d-8yh3
3
vulnerability VCID-sy2z-sqgk-d7hg
4
vulnerability VCID-z7ac-jr58-gkfm
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@6.23.0
1
url pkg:npm/undici@7.18.2
purl pkg:npm/undici@7.18.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgd1-7u6j-p7dh
1
vulnerability VCID-n6ew-t7g1-33gn
2
vulnerability VCID-ph2p-u33d-8yh3
3
vulnerability VCID-sy2z-sqgk-d7hg
4
vulnerability VCID-vdca-exd1-rfce
5
vulnerability VCID-z7ac-jr58-gkfm
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/undici@7.18.2
aliases CVE-2026-22036, GHSA-g9mf-h72j-4rw9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb3h-efqz-dff3
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:npm/undici@4.0.0-rc.2