Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-1526— undici is vulnerable to Unbounded Memory Consumption in undici WebSocket permessage-deflate Decompression

CVSS 7.5 · High EPSS 0.02% · P6
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-1526

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
undici is vulnerable to Unbounded Memory Consumption in undici WebSocket permessage-deflate Decompression
Source: NVD (National Vulnerability Database)
Vulnerability Description
The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incoming compressed frames without enforcing any limit on the decompressed data size. A malicious WebSocket server can send a small compressed frame (a "decompression bomb") that expands to an extremely large size in memory, causing the Node.js process to exhaust available memory and crash or become unresponsive. The vulnerability exists in the PerMessageDeflate.decompress() method, which accumulates all decompressed chunks in memory and concatenates them into a single Buffer without checking whether the total size exceeds a safe threshold.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对高度压缩数据的处理不恰当(数据放大攻击)
Source: NVD (National Vulnerability Database)
Vulnerability Title
undici 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
undici是Node.js开源的一个HTTP/1.1客户端。 undici存在安全漏洞,该漏洞源于在permessage-deflate解压缩期间存在无限制内存消耗,可能导致恶意WebSocket服务器发送小型压缩帧,使Node.js进程耗尽内存并崩溃或无响应。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
undiciundici < 6.24.0; 7.0.0 < 7.24.0 -

II. Public POCs for CVE-2026-1526

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-1526

登录查看更多情报信息。

Same Patch Batch · undici · 2026-03-12 · 6 CVEs total

CVE-2026-15287.5 HIGHundici is vulnerable to Malicious WebSocket 64-bit length overflows undici parser and cras
CVE-2026-22297.5 HIGHundici is vulnerable to Unhandled Exception in undici WebSocket Client Due to Invalid serv
CVE-2026-15256.5 MEDIUMundici is vulnerable to Inconsistent Interpretation of HTTP Requests ('HTTP Request/Respon
CVE-2026-25815.9 MEDIUMundici is vulnerable to Unbounded Memory Consumption in in Undici's DeduplicationHandler v
CVE-2026-15274.6 MEDIUMundici is vulnerable to CRLF Injection via upgrade option

IV. Related Vulnerabilities

V. Comments for CVE-2026-1526

No comments yet


Leave a comment