GHSA-qj8w-gfj5-8c6v

Suggest an improvement
Source
https://github.com/advisories/GHSA-qj8w-gfj5-8c6v
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-qj8w-gfj5-8c6v/GHSA-qj8w-gfj5-8c6v.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qj8w-gfj5-8c6v
Aliases
  • CVE-2026-34043
Published
2026-03-27T18:18:54Z
Modified
2026-03-27T18:31:25.208557Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects
Details

Impact

What kind of vulnerability is it?

It is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely.

Who is impacted?

Applications that use serialize-javascript to serialize untrusted or user-controlled objects are at risk. While direct exploitation is difficult, it becomes a high-priority threat if the application is also vulnerable to Prototype Pollution or handles untrusted data via YAML Deserialization, as these could be used to inject the malicious object.

Patches

Has the problem been patched?

Yes, the issue has been patched by replacing instanceof Array checks with Array.isArray() and using Object.keys() for sparse array detection.

What versions should users upgrade to?

Users should upgrade to v7.0.5 or later.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

There is no direct code-level workaround within the library itself. However, users can mitigate the risk by:

  • Validating and sanitizing all input before passing it to the serialize() function.
  • Ensuring the environment is protected against Prototype Pollution.
  • Upgrading to v7.0.5 as soon as possible.

Acknowledgements

Serialize JavaScript thanks Tomer Aberbach (@TomerAberbach) for discovering and privately disclosing this issue.

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-400",
        "CWE-834"
    ],
    "nvd_published_at": null,
    "github_reviewed_at": "2026-03-27T18:18:54Z",
    "severity": "MODERATE"
}
References

Affected packages

npm / serialize-javascript

Package

Name
serialize-javascript
View open source insights on deps.dev
Purl
pkg:npm/serialize-javascript

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.5

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-qj8w-gfj5-8c6v/GHSA-qj8w-gfj5-8c6v.json"