Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-32630— file-type affected by ZIP Decompression Bomb DoS via [Content_Types].xml entry

CVSS 5.3 · Medium EPSS 0.07% · P23
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-32630

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
file-type affected by ZIP Decompression Bomb DoS via [Content_Types].xml entry
Source: NVD (National Vulnerability Database)
Vulnerability Description
file-type detects the file type of a file, stream, or data. From 20.0.0 to 21.3.1, a crafted ZIP file can trigger excessive memory growth during type detection in file-type when using fileTypeFromBuffer(), fileTypeFromBlob(), or fileTypeFromFile(). The ZIP inflate output limit is enforced for stream-based detection, but not for known-size inputs. As a result, a small compressed ZIP can cause file-type to inflate and process a much larger payload while probing ZIP-based formats such as OOXML. This vulnerability is fixed in 21.3.2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对高度压缩数据的处理不恰当(数据放大攻击)
Source: NVD (National Vulnerability Database)
Vulnerability Title
file type 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
file type是Sindre Sorhus个人开发者的一个文件类型检测工具。 file type 20.0.0版本至21.3.1版本存在安全漏洞,该漏洞源于特制ZIP文件在使用fileTypeFromBuffer、fileTypeFromBlob或fileTypeFromFile进行类型检测时可能触发内存过度增长,基于流的检测强制执行ZIP解压缩输出限制,但对已知大小的输入未强制执行,可能导致小型压缩ZIP使file-type在处理基于ZIP的格式时解压缩和处理更大的有效载荷。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
sindresorhusfile-type >= 20.0.0, < 21.3.2 -

II. Public POCs for CVE-2026-32630

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-32630

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-32630

No comments yet


Leave a comment