The V8 release used in Node.js v24.0.0 has changed how string hashes are computed using rapidhash. This implementation re-introduces the HashDoS vulnerability as an attacker who can control the strings to be hashed can generate many hash collisions - an attacker can generate collisions even without knowing the hash-seed.
* This vulnerability affects Node.js v24.x users.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 29 Jul 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | nodejs: Node.js Rapidhash HashDoS Vulnerability | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 21 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-407 | |
| Metrics |
ssvc
|
Fri, 18 Jul 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The V8 release used in Node.js v24.0.0 has changed how string hashes are computed using rapidhash. This implementation re-introduces the HashDoS vulnerability as an attacker who can control the strings to be hashed can generate many hash collisions - an attacker can generate collisions even without knowing the hash-seed. * This vulnerability affects Node.js v24.x users. | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: hackerone
Published: 2025-07-18T22:54:27.205Z
Updated: 2025-11-04T21:09:46.228Z
Reserved: 2025-02-20T01:00:01.798Z
Link: CVE-2025-27209
Updated: 2025-11-04T21:09:46.228Z
Status : Awaiting Analysis
Published: 2025-07-18T23:15:23.190
Modified: 2025-11-04T22:16:08.007
Link: CVE-2025-27209