body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.
History

Mon, 24 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 18:45:00 +0000

Type Values Removed Values Added
Description body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.
Title body-parser vulnerable to denial of service when url encoding is used
Weaknesses CWE-400
References
Metrics cvssV4_0

{'score': 5.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:P/AU:Y'}


cve-icon MITRE

Status: PUBLISHED

Assigner: openjs

Published: 2025-11-24T18:29:36.725Z

Updated: 2025-11-24T18:57:00.939Z

Reserved: 2025-11-20T02:16:16.283Z

Link: CVE-2025-13466

cve-icon Vulnrichment

Updated: 2025-11-24T18:56:36.297Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-24T19:15:46.857

Modified: 2025-11-25T22:16:16.690

Link: CVE-2025-13466

cve-icon Redhat

No data.