body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic.
This issue is addressed in version 2.2.1.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1. | |
| Title | body-parser vulnerable to denial of service when url encoding is used | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: openjs
Published: 2025-11-24T18:29:36.725Z
Updated: 2025-11-24T18:57:00.939Z
Reserved: 2025-11-20T02:16:16.283Z
Link: CVE-2025-13466
Updated: 2025-11-24T18:56:36.297Z
Status : Awaiting Analysis
Published: 2025-11-24T19:15:46.857
Modified: 2025-11-25T22:16:16.690
Link: CVE-2025-13466
No data.