Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-2581— undici is vulnerable to Unbounded Memory Consumption in in Undici's DeduplicationHandler via Response Buffering leads to DoS

CVSS 5.9 · Medium EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-2581

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
undici is vulnerable to Unbounded Memory Consumption in in Undici's DeduplicationHandler via Response Buffering leads to DoS
Source: NVD (National Vulnerability Database)
Vulnerability Description
This is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Service (DoS). In vulnerable Undici versions, when interceptors.deduplicate() is enabled, response data for deduplicated requests could be accumulated in memory for downstream handlers. An attacker-controlled or untrusted upstream endpoint can exploit this with large/chunked responses and concurrent identical requests, causing high memory usage and potential OOM process termination. Impacted users are applications that use Undici’s deduplication interceptor against endpoints that may produce large or long-lived response bodies. PatchesThe issue has been patched by changing deduplication behavior to stream response chunks to downstream handlers as they arrive (instead of full-body accumulation), and by preventing late deduplication when body streaming has already started. Users should upgrade to the first official Undici (and Node.js, where applicable) releases that include this patch.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
不加限制或调节的资源分配
Source: NVD (National Vulnerability Database)
Vulnerability Title
undici 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
undici是Node.js开源的一个HTTP/1.1客户端。 undici存在安全漏洞,该漏洞源于重复请求的响应数据可能累积在内存中,可能导致拒绝服务攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
undiciundici < 6.24.0; 7.0.0 < 7.24.0 -

II. Public POCs for CVE-2026-2581

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-2581

登录查看更多情报信息。

Same Patch Batch · undici · 2026-03-12 · 6 CVEs total

CVE-2026-15267.5 HIGHundici is vulnerable to Unbounded Memory Consumption in undici WebSocket permessage-deflat
CVE-2026-15287.5 HIGHundici is vulnerable to Malicious WebSocket 64-bit length overflows undici parser and cras
CVE-2026-22297.5 HIGHundici is vulnerable to Unhandled Exception in undici WebSocket Client Due to Invalid serv
CVE-2026-15256.5 MEDIUMundici is vulnerable to Inconsistent Interpretation of HTTP Requests ('HTTP Request/Respon
CVE-2026-15274.6 MEDIUMundici is vulnerable to CRLF Injection via upgrade option

IV. Related Vulnerabilities

V. Comments for CVE-2026-2581

No comments yet


Leave a comment