GHSA-cxrh-j4jr-qwg3

Suggest an improvement
Source
https://github.com/advisories/GHSA-cxrh-j4jr-qwg3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-cxrh-j4jr-qwg3/GHSA-cxrh-j4jr-qwg3.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-cxrh-j4jr-qwg3
Aliases
Published
2025-05-15T14:15:06Z
Modified
2025-05-16T02:07:00Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
undici Denial of Service attack via bad certificate data
Details

Impact

Applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak.

Patches

This has been patched in https://github.com/nodejs/undici/pull/4088.

Workarounds

If a webhook fails, avoid keep calling it repeatedly.

References

Reported as: https://github.com/nodejs/undici/issues/3895

Database specific
{
    "nvd_published_at": "2025-05-15T18:15:38Z",
    "cwe_ids": [
        "CWE-401"
    ],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2025-05-15T14:15:06Z"
}
References

Affected packages

npm / undici

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.29.0

npm / undici

Package

Affected ranges

Type
SEMVER
Events
Introduced
6.0.0
Fixed
6.21.2

npm / undici

Package

Affected ranges

Type
SEMVER
Events
Introduced
7.0.0
Fixed
7.5.0