CVE-2026-2229
- EPSS 0.19%
- Veröffentlicht 12.03.2026 20:27:05
- Zuletzt bearbeitet 20.03.2026 15:39:12
ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the server_max_window_bits parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically adver...
CVE-2026-1528
- EPSS 0.13%
- Veröffentlicht 12.03.2026 20:21:57
- Zuletzt bearbeitet 20.03.2026 15:41:40
ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches ...
CVE-2026-1527
- EPSS 0.01%
- Veröffentlicht 12.03.2026 20:17:18
- Zuletzt bearbeitet 20.03.2026 15:49:31
ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to: * Inject arbitrary HTTP headers * Terminate the HTTP request prematurely and smuggle raw data to...
CVE-2026-2581
- EPSS 0.02%
- Veröffentlicht 12.03.2026 20:13:19
- Zuletzt bearbeitet 18.03.2026 13:37:08
This is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Service (DoS). In vulnerable Undici versions, when interceptors.deduplicate() is enabled, response data for deduplicated requests could be accumulated in...
CVE-2026-1526
- EPSS 0.02%
- Veröffentlicht 12.03.2026 20:08:05
- Zuletzt bearbeitet 20.03.2026 15:56:47
The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incomin...
CVE-2026-1525
- EPSS 0.02%
- Veröffentlicht 12.03.2026 19:56:55
- Zuletzt bearbeitet 19.03.2026 17:29:34
Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the...
CVE-2026-22036
- EPSS 0.02%
- Veröffentlicht 14.01.2026 19:07:13
- Zuletzt bearbeitet 22.01.2026 21:15:50
Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage ...
CVE-2025-47279
- EPSS 0.05%
- Veröffentlicht 15.05.2025 17:16:02
- Zuletzt bearbeitet 06.02.2026 20:16:08
Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the...
CVE-2025-22150
- EPSS 0.61%
- Veröffentlicht 21.01.2025 18:15:14
- Zuletzt bearbeitet 21.01.2025 18:15:14
Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predi...
- EPSS 0.22%
- Veröffentlicht 08.07.2024 21:15:12
- Zuletzt bearbeitet 21.11.2024 09:25:31
Undici is an HTTP/1.1 client, written from scratch for Node.js. Depending on network and process conditions of a `fetch()` request, `response.arrayBuffer()` might include portion of memory from the Node.js process. This has been patched in v6.19.2.