CVE-2026-40879

Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.19, when an attacker sends many small, valid JSON messages in one TCP frame, handleData() recurses once per message; the buffer shrinks each call. maxBufferSize is never reached; call stack overflows instead. A ~47 KB payload is sufficient to trigger RangeError. This vulnerability is fixed in 11.1.19.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nestjs:nest:*:*:*:*:*:node.js:*:*

History

24 Apr 2026, 13:46

Type Values Removed Values Added
CPE cpe:2.3:a:nestjs:nest:*:*:*:*:*:node.js:*:*
References () https://github.com/nestjs/nest/security/advisories/GHSA-hpwf-8g29-85qm - () https://github.com/nestjs/nest/security/advisories/GHSA-hpwf-8g29-85qm - Vendor Advisory
First Time Nestjs
Nestjs nest

21 Apr 2026, 20:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-21 20:17

Updated : 2026-04-24 13:46


NVD link : CVE-2026-40879

Mitre link : CVE-2026-40879

CVE.ORG link : CVE-2026-40879


JSON object : View

Products Affected

nestjs

  • nest
CWE
CWE-674

Uncontrolled Recursion