Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.
References
Configurations
History
03 Apr 2026, 16:53
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Yahoo serialize
Yahoo |
|
| CPE | cpe:2.3:a:yahoo:serialize:*:*:*:*:*:*:*:* | |
| References | () https://github.com/yahoo/serialize-javascript/commit/f147e90269b58bb6e539cfdf3d0e20d6ad14204b - Patch | |
| References | () https://github.com/yahoo/serialize-javascript/releases/tag/v7.0.5 - Release Notes | |
| References | () https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-qj8w-gfj5-8c6v - Vendor Advisory |
01 Apr 2026, 14:24
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
31 Mar 2026, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 03:15
Updated : 2026-04-03 16:53
NVD link : CVE-2026-34043
Mitre link : CVE-2026-34043
CVE.ORG link : CVE-2026-34043
JSON object : View
Products Affected
yahoo
- serialize
