Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mrq3-vjjr-p77c

Опубликовано: 02 фев. 2026
Источник: github
Github: Прошло ревью
CVSS3: 3.7

Описание

Fastify Vulnerable to DoS via Unbounded Memory Allocation in sendWebStream

Impact

A Denial of Service vulnerability in Fastify’s Web Streams response handling can allow a remote client to exhaust server memory. Applications that return a ReadableStream (or Response with a Web Stream body) via reply.send() are impacted. A slow or non-reading client can trigger unbounded buffering when backpressure is ignored, leading to process crashes or severe degradation.

Patches

The issue is fixed in Fastify 5.7.3. Users should upgrade to 5.7.3 or later.

Workarounds

Avoid sending Web Streams from Fastify responses (e.g., ReadableStream or Response bodies). Use Node.js streams (stream.Readable) or buffered payloads instead until the project can upgrade.

References

Пакеты

Наименование

fastify

npm
Затронутые версииВерсия исправления

<= 5.7.2

5.7.3

EPSS

Процентиль: 11%
0.00037
Низкий

3.7 Low

CVSS3

Дефекты

CWE-770

Связанные уязвимости

CVSS3: 3.7
nvd
4 дня назад

Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.3, a denial-of-service vulnerability in Fastify’s Web Streams response handling can allow a remote client to exhaust server memory. Applications that return a ReadableStream (or Response with a Web Stream body) via reply.send() are impacted. A slow or non-reading client can trigger unbounded buffering when backpressure is ignored, leading to process crashes or severe degradation. This issue has been patched in version 5.7.3.

EPSS

Процентиль: 11%
0.00037
Низкий

3.7 Low

CVSS3

Дефекты

CWE-770