CVE-2026-22774

Source
https://cve.org/CVERecord?id=CVE-2026-22774
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-22774.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-22774
Aliases
  • GHSA-vw5p-8cq8-m7mv
Published
2026-01-15T18:53:21.963Z
Modified
2026-01-18T03:44:21.692318Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
devalue vulnerable to denial of service due to memory exhaustion in devalue.parse
Details

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.3.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. The root cause is the typed array hydration expecting an ArrayBuffer as input, but not checking the assumption before creating the typed array. This vulnerability is fixed in 5.6.2.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/22xxx/CVE-2026-22774.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-405"
    ]
}
References

Affected packages

Git / github.com/sveltejs/devalue

Affected ranges

Type
GIT
Repo
https://github.com/sveltejs/devalue
Events

Affected versions

v5.*

v5.3.0
v5.3.1
v5.3.2
v5.4.0
v5.4.1
v5.4.2
v5.5.0
v5.6.0
v5.6.1

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-22774.json"