Description

A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values. Node.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision. This vulnerability affects **20.x, 22.x, 24.x, and 25.x**.

INFO

Published Date :

2026-03-30T19:07:28.356Z

Last Modified :

2026-03-30T19:45:22.905Z

Source :

hackerone
AFFECTED PRODUCTS

The following products are affected by CVE-2026-21713 vulnerability.

Vendors Products
Nodejs
  • Nodejs
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-21713.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact