| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hpwf-8g29-85qm | Nest Affected by DoS via Recursive handleData in JsonSocket (TCP Transport) |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nestjs
Nestjs nest |
|
| Vendors & Products |
Nestjs
Nestjs nest |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.19, when an attacker sends many small, valid JSON messages in one TCP frame, handleData() recurses once per message; the buffer shrinks each call. maxBufferSize is never reached; call stack overflows instead. A ~47 KB payload is sufficient to trigger RangeError. This vulnerability is fixed in 11.1.19. | |
| Title | Nest: DoS via Recursive handleData in JsonSocket (TCP Transport) | |
| Weaknesses | CWE-674 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T19:38:04.805Z
Reserved: 2026-04-15T15:57:41.719Z
Link: CVE-2026-40879
Updated: 2026-04-21T19:37:59.587Z
Status : Received
Published: 2026-04-21T20:17:01.533
Modified: 2026-04-21T20:17:01.533
Link: CVE-2026-40879
No data.
OpenCVE Enrichment
Updated: 2026-04-22T05:45:09Z
Github GHSA