Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-35515— @nestjs/core Improperly Neutralizes Special Elements in Output Used by a Downstream Component ('Injection')

EPSS 0.01% · P2
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-35515

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
@nestjs/core Improperly Neutralizes Special Elements in Output Used by a Downstream Component ('Injection')
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.18, SseStream._transform() interpolates message.type and message.id directly into Server-Sent Events text protocol output without sanitizing newline characters (\r, \n). Since the SSE protocol treats both \r and \n as field delimiters and \n\n as event boundaries, an attacker who can influence these fields through upstream data sources can inject arbitrary SSE events, spoof event types, and corrupt reconnection state. This vulnerability is fixed in 11.1.18.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输出中的特殊元素转义处理不恰当(注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
nest 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
nest是nestjs开源的一个 Node.js 框架,用于使用 TypeScript/JavaScript 构建高效、可扩展和企业级的服务器端应用程序。 Nest 11.1.18之前版本存在注入漏洞,该漏洞源于SseStream._transform函数将message.type和message.id直接插入服务器发送事件文本协议输出中,而未对换行符进行清理,可能导致能够通过上游数据源影响这些字段的攻击者注入任意SSE事件、伪造事件类型并破坏重连状态。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
nestjsnest < 11.1.18 -

II. Public POCs for CVE-2026-35515

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-35515

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-35515

No comments yet


Leave a comment