Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-22036

Опубликовано: 14 янв. 2026
Источник: debian
EPSS Низкий

Описание

Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-undicifixed7.18.2+dfsg+~cs3.2.0-1package
node-undicino-dsatrixiepackage
node-undicino-dsabookwormpackage

Примечания

  • https://github.com/nodejs/undici/security/advisories/GHSA-g9mf-h72j-4rw9

  • Fixed by: https://github.com/nodejs/undici/commit/b04e3cbb569c1596f86c108e9b52c79d8475dcb3 (v7.18.2)

EPSS

Процентиль: 4%
0.00018
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
24 дня назад

Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.

CVSS3: 5.9
nvd
24 дня назад

Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.

CVSS3: 5.9
github
24 дня назад

Undici has an unbounded decompression chain in HTTP responses on Node.js Fetch API via Content-Encoding leads to resource exhaustion

suse-cvrf
12 дней назад

Security update for nodejs22

EPSS

Процентиль: 4%
0.00018
Низкий