CVE-2026-1528

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*
cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*

History

20 Mar 2026, 15:41

Type Values Removed Values Added
CPE cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*
First Time Nodejs undici
Nodejs
References () https://cna.openjsf.org/security-advisories.html - () https://cna.openjsf.org/security-advisories.html - Vendor Advisory
References () https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj - () https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj - Vendor Advisory
References () https://hackerone.com/reports/3537648 - () https://hackerone.com/reports/3537648 - Permissions Required

13 Mar 2026, 20:06

Type Values Removed Values Added
Summary
  • (es) Impacto Un servidor puede responder con un marco WebSocket utilizando el formato de longitud de 64 bits y una longitud extremadamente grande. El ByteParser de undici desborda las operaciones matemáticas internas, termina en un estado inválido y lanza un TypeError fatal que termina el proceso. Parches Parcheado en la versión v7.24.0 y v6.24.0 de undici. Los usuarios deben actualizar a esta versión o posterior.

12 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-12 21:16

Updated : 2026-03-20 15:41


NVD link : CVE-2026-1528

Mitre link : CVE-2026-1528

CVE.ORG link : CVE-2026-1528


JSON object : View

Products Affected

nodejs

  • undici
CWE
CWE-248

Uncaught Exception

CWE-1284

Improper Validation of Specified Quantity in Input