Description
body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.
INFO
Published Date :
2025-11-24T18:29:36.725Z
Last Modified :
2025-11-24T18:57:00.939Z
Source :
openjs
AFFECTED PRODUCTS
The following products are affected by CVE-2025-13466 vulnerability.
| Vendors | Products |
|---|---|
| Expressjs |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-13466.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact