CVE-2025-13466

NameCVE-2025-13466
Descriptionbody-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1121417

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-body-parser (PTS)bullseye1.19.0-2fixed
bookworm1.20.1+~1.19.2-1fixed
trixie1.20.3+~1.19.5-3fixed
forky, sid2.2.1+~1.19.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-body-parsersourcebullseye(not affected)
node-body-parsersourcebookworm(not affected)
node-body-parsersourcetrixie(not affected)
node-body-parsersource(unstable)2.2.1+~1.19.6-11121417

Notes

[trixie] - node-body-parser <not-affected> (Vulnerable code introduced later)
[bookworm] - node-body-parser <not-affected> (Vulnerable code introduced later)
[bullseye] - node-body-parser <not-affected> (Vulnerable code introduced later)
https://github.com/expressjs/body-parser/security/advisories/GHSA-wqch-xfxh-vrr4
Introduced with: https://github.com/expressjs/body-parser/commit/f27f2ced83d2f2a19e5305d09b4e31dec75b3e5c (v2.2.0)
Fixed by: https://github.com/expressjs/body-parser/commit/b204886a6744b0b6d297cd0e849d75de836f3b63 (v2.2.1)

Search for package or bug name: Reporting problems