Description

A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values. Node.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision. This vulnerability affects **20.x, 22.x, 24.x, and 25.x**.

INFO

Published Date :

2026-03-30T19:07:28.356Z

Last Modified :

2026-03-30T19:45:22.905Z

Source :

hackerone
AFFECTED PRODUCTS

The following products are affected by CVE-2026-21713 vulnerability.

Vendors Products
Nodejs
  • Nodejs
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-21713.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact