| Name | CVE-2025-13466 |
| Description | body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic. This issue is addressed in version 2.2.1. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1121417 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| node-body-parser (PTS) | bullseye | 1.19.0-2 | fixed |
| bookworm | 1.20.1+~1.19.2-1 | fixed | |
| trixie | 1.20.3+~1.19.5-3 | fixed | |
| forky, sid | 2.2.1+~1.19.6-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| node-body-parser | source | bullseye | (not affected) | |||
| node-body-parser | source | bookworm | (not affected) | |||
| node-body-parser | source | trixie | (not affected) | |||
| node-body-parser | source | (unstable) | 2.2.1+~1.19.6-1 | 1121417 |
[trixie] - node-body-parser <not-affected> (Vulnerable code introduced later)
[bookworm] - node-body-parser <not-affected> (Vulnerable code introduced later)
[bullseye] - node-body-parser <not-affected> (Vulnerable code introduced later)
https://github.com/expressjs/body-parser/security/advisories/GHSA-wqch-xfxh-vrr4
Introduced with: https://github.com/expressjs/body-parser/commit/f27f2ced83d2f2a19e5305d09b4e31dec75b3e5c (v2.2.0)
Fixed by: https://github.com/expressjs/body-parser/commit/b204886a6744b0b6d297cd0e849d75de836f3b63 (v2.2.1)