Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-9ykq-nq81-4fcp
Vulnerability ID VCID-9ykq-nq81-4fcp
Aliases CVE-2025-15284
GHSA-6rw7-vpxm-498p
Summary qs's arrayLimit bypass in its bracket notation allows DoS via memory exhaustion The `arrayLimit` option in qs did not enforce limits for bracket notation (`a[]=1&a[]=2`), only for indexed notation (`a[0]=1`). This is a consistency bug; `arrayLimit` should apply uniformly across all array notations. **Note:** The default `parameterLimit` of 1000 effectively mitigates the DoS scenario originally described. With default options, bracket notation cannot produce arrays larger than `parameterLimit` regardless of `arrayLimit`, because each `a[]=value` consumes one parameter slot. The severity has been reduced accordingly.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15284.json
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
epss 0.00072 https://api.first.org/data/v1/epss?cve=CVE-2025-15284
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-6rw7-vpxm-498p
cvssv3.1 3.7 https://github.com/ljharb/qs
cvssv4 6.3 https://github.com/ljharb/qs
generic_textual MODERATE https://github.com/ljharb/qs
cvssv3.1 3.7 https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
cvssv4 6.3 https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
generic_textual MODERATE https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
ssvc Track https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
cvssv3.1 3.7 https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
cvssv3.1_qr MODERATE https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
cvssv4 6.3 https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
generic_textual MODERATE https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
ssvc Track https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
cvssv3.1 3.7 https://nvd.nist.gov/vuln/detail/CVE-2025-15284
cvssv4 6.3 https://nvd.nist.gov/vuln/detail/CVE-2025-15284
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2025-15284
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15284.json
https://api.first.org/data/v1/epss?cve=CVE-2025-15284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15284
https://github.com/ljharb/qs
https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
1124315 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1124315
2425946 https://bugzilla.redhat.com/show_bug.cgi?id=2425946
CVE-2025-15284 https://nvd.nist.gov/vuln/detail/CVE-2025-15284
GHSA-6rw7-vpxm-498p https://github.com/advisories/GHSA-6rw7-vpxm-498p
GHSA-6rw7-vpxm-498p https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
RHSA-2026:0261 https://access.redhat.com/errata/RHSA-2026:0261
RHSA-2026:0414 https://access.redhat.com/errata/RHSA-2026:0414
RHSA-2026:0531 https://access.redhat.com/errata/RHSA-2026:0531
RHSA-2026:0761 https://access.redhat.com/errata/RHSA-2026:0761
RHSA-2026:1000 https://access.redhat.com/errata/RHSA-2026:1000
RHSA-2026:1517 https://access.redhat.com/errata/RHSA-2026:1517
RHSA-2026:1552 https://access.redhat.com/errata/RHSA-2026:1552
RHSA-2026:1596 https://access.redhat.com/errata/RHSA-2026:1596
RHSA-2026:1730 https://access.redhat.com/errata/RHSA-2026:1730
RHSA-2026:1942 https://access.redhat.com/errata/RHSA-2026:1942
RHSA-2026:2078 https://access.redhat.com/errata/RHSA-2026:2078
RHSA-2026:2129 https://access.redhat.com/errata/RHSA-2026:2129
RHSA-2026:2145 https://access.redhat.com/errata/RHSA-2026:2145
RHSA-2026:2147 https://access.redhat.com/errata/RHSA-2026:2147
RHSA-2026:2148 https://access.redhat.com/errata/RHSA-2026:2148
RHSA-2026:2149 https://access.redhat.com/errata/RHSA-2026:2149
RHSA-2026:2256 https://access.redhat.com/errata/RHSA-2026:2256
RHSA-2026:2350 https://access.redhat.com/errata/RHSA-2026:2350
RHSA-2026:2456 https://access.redhat.com/errata/RHSA-2026:2456
RHSA-2026:2500 https://access.redhat.com/errata/RHSA-2026:2500
RHSA-2026:2568 https://access.redhat.com/errata/RHSA-2026:2568
RHSA-2026:2672 https://access.redhat.com/errata/RHSA-2026:2672
RHSA-2026:2681 https://access.redhat.com/errata/RHSA-2026:2681
RHSA-2026:2762 https://access.redhat.com/errata/RHSA-2026:2762
RHSA-2026:2900 https://access.redhat.com/errata/RHSA-2026:2900
RHSA-2026:3710 https://access.redhat.com/errata/RHSA-2026:3710
RHSA-2026:3712 https://access.redhat.com/errata/RHSA-2026:3712
RHSA-2026:3713 https://access.redhat.com/errata/RHSA-2026:3713
RHSA-2026:3825 https://access.redhat.com/errata/RHSA-2026:3825
RHSA-2026:4185 https://access.redhat.com/errata/RHSA-2026:4185
RHSA-2026:4215 https://access.redhat.com/errata/RHSA-2026:4215
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15284.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/ljharb/qs
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L Found at https://github.com/ljharb/qs
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L Found at https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-30T14:55:26Z/ Found at https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L Found at https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-30T14:55:26Z/ Found at https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2025-15284
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L Found at https://nvd.nist.gov/vuln/detail/CVE-2025-15284
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.19331
EPSS Score 0.00061
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:53:34.774462+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/npm/qs/CVE-2025-15284.yml 38.0.0