GHSA-wqch-xfxh-vrr4

Suggest an improvement
Source
https://github.com/advisories/GHSA-wqch-xfxh-vrr4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/11/GHSA-wqch-xfxh-vrr4/GHSA-wqch-xfxh-vrr4.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-wqch-xfxh-vrr4
Aliases
  • CVE-2025-13466
Related
Published
2025-11-25T14:20:21Z
Modified
2025-11-25T18:29:35.008311Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
  • 5.5 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:P CVSS Calculator
Summary
body-parser is vulnerable to denial of service when url encoding is used
Details

Impact

body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic.

Patches

This issue is addressed in version 2.2.1.

Database specific
{
    "cwe_ids": [
        "CWE-400"
    ],
    "github_reviewed": true,
    "severity": "MODERATE",
    "github_reviewed_at": "2025-11-25T14:20:21Z",
    "nvd_published_at": "2025-11-24T19:15:46Z"
}
References

Affected packages

npm / body-parser

Package

Affected ranges

Type
SEMVER
Events
Introduced
2.2.0
Fixed
2.2.1