CVE-2026-44290: DoS in protobufjs ≤7.5.5
Plateforme
nodejs
Composant
protobufjs
CVE-2026-44290 describes a Denial of Service (DoS) vulnerability affecting protobufjs versions up to 7.5.5. This vulnerability arises from improper handling of schema option paths, allowing attackers to corrupt process-wide JavaScript constructors. Successful exploitation can lead to a persistent denial of service, impacting the application's functionality and potentially affecting other processes.
Impact et Scénarios d'Attaquetraduction en cours…
The core of this vulnerability lies in protobufjs's option handling mechanism. When processing protobuf schemas or JSON descriptors, the parser incorrectly traverses inherited object properties. A malicious actor can craft a schema or descriptor that exploits this flaw, causing the parser to write to properties on global JavaScript constructors, such as Object, Array, or String. This corruption effectively breaks the fundamental building blocks of the JavaScript runtime, leading to unpredictable behavior and application crashes. The impact is persistent; the corruption remains until the process is restarted, resulting in a prolonged denial of service. This differs from transient DoS attacks as it requires no ongoing exploitation.
Contexte d'Exploitationtraduction en cours…
CVE-2026-44290 was published on 2026-05-12. The vulnerability's severity is rated as HIGH (CVSS 7.5). Currently, there are no publicly available Proof-of-Concept (POC) exploits. The vulnerability is not listed on KEV or EPSS, indicating a low to medium probability of active exploitation at this time. Monitor security advisories and threat intelligence feeds for any updates regarding exploitation attempts.
Renseignement sur les Menaces
Statut de l'Exploit
Vecteur CVSS
Que signifient ces métriques?
- Attack Vector
- Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
- Attack Complexity
- Faible — aucune condition spéciale requise. Exploitable de manière fiable.
- Privileges Required
- Aucun — sans authentification. Aucune identifiant requis pour exploiter.
- User Interaction
- Aucune — attaque automatique et silencieuse. La victime ne fait rien.
- Scope
- Inchangé — impact limité au composant vulnérable.
- Confidentiality
- Aucun — aucun impact sur la confidentialité.
- Integrity
- Aucun — aucun impact sur l'intégrité.
- Availability
- Élevé — panne complète ou épuisement des ressources. Déni de service total.
Logiciel Affecté
Classification de Faiblesse (CWE)
Chronologie
- Publiée
Mitigation et Contournementstraduction en cours…
The primary mitigation for CVE-2026-44290 is to upgrade to a patched version of protobufjs. While a specific fixed version is not yet available, monitoring the project's release notes is crucial. In the interim, implement strict schema validation to prevent the parsing of untrusted or potentially malicious protobuf schemas and JSON descriptors. This can involve whitelisting allowed schema structures or using a schema validation library. Consider implementing a Web Application Firewall (WAF) or proxy to inspect and filter incoming protobuf data, blocking requests containing suspicious schema constructs. Carefully review any third-party libraries or components that utilize protobufjs and ensure they are not vulnerable to this issue.
Comment corrigertraduction en cours…
Aucun correctif officiel disponible. Recherchez des alternatives ou surveillez les mises à jour.
Questions fréquentestraduction en cours…
What is CVE-2026-44290 — DoS in protobufjs?
CVE-2026-44290 is a high-severity Denial of Service vulnerability in protobufjs versions up to 7.5.5. A crafted protobuf schema can corrupt JavaScript constructors, leading to application crashes and a persistent denial of service.
Am I affected by CVE-2026-44290 in protobufjs?
You are affected if you are using protobufjs versions 7.5.5 or earlier. Review your project dependencies to determine if you are using a vulnerable version.
How do I fix CVE-2026-44290 in protobufjs?
Upgrade to a patched version of protobufjs as soon as it becomes available. In the meantime, implement strict schema validation and consider WAF rules to filter malicious protobuf data.
Is CVE-2026-44290 being actively exploited?
Currently, there are no publicly known exploits or reports of active exploitation. However, the vulnerability's severity warrants immediate attention and mitigation.
Where can I find the official protobufjs advisory for CVE-2026-44290?
Refer to the protobufjs project's official website and GitHub repository for updates and advisories related to CVE-2026-44290: https://protobufjs.org/
Ton projet est-il affecté ?
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Essayez maintenant — sans compte
scanZone.subtitle
Glissez-déposez votre fichier de dépendances
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...