BIT-node-min-2026-21713

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/node-min/BIT-node-min-2026-21713.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-node-min-2026-21713
Aliases
Published
2026-04-06T07:58:50.453Z
Modified
2026-04-06T08:41:22.040550201Z
Summary
[none]
Details

A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values.

Node.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision.

This vulnerability affects 20.x, 22.x, 24.x, and 25.x.

Database specific
{
    "severity": "Medium",
    "cpes": [
        "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*"
    ]
}
References

Affected packages

Bitnami / node-min

Package

Name
node-min
Purl
pkg:bitnami/node-min

Severity

  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20.20.2
Introduced
21.0.0
Fixed
24.14.1
Introduced
25.0.0
Fixed
25.8.2

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/node-min/BIT-node-min-2026-21713.json"