Description

body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.

INFO

Published Date :

2025-11-24T18:29:36.725Z

Last Modified :

2025-11-24T18:57:00.939Z

Source :

openjs
AFFECTED PRODUCTS

The following products are affected by CVE-2025-13466 vulnerability.

Vendors Products
Expressjs
  • Body-parser
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-13466.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact