Description
Servify Express is a Node.js package to start an Express server and log the port it's running on. Prior to 1.2, the Express server used express.json() without a size limit, which could allow attackers to send extremely large request bodies. This can cause excessive memory usage, degraded performance, or process crashes, resulting in a Denial of Service (DoS). Any application using the JSON parser without limits and exposed to untrusted clients is affected. The issue is not a flaw in Express itself, but in configuration. This issue is fixed in version 1.2. To work around, consider adding a limit option to the JSON parser, rate limiting at the application or reverse-proxy level, rejecting unusually large requests before parsing, or using a reverse proxy (such as NGINX) to enforce maximum request body sizes.
Published: 2025-12-12
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-qgc4-8p88-4w7m Servify-express rate limit issue
History

Tue, 17 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Servify-express.js
Servify-express.js servify Express
CPEs cpe:2.3:a:servify-express.js:servify_express:*:*:*:*:*:node.js:*:*
Vendors & Products Servify-express.js
Servify-express.js servify Express
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Servify-express Project
Servify-express Project servify-express
Vendors & Products Servify-express Project
Servify-express Project servify-express

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 08:00:00 +0000

Type Values Removed Values Added
Description Servify Express is a Node.js package to start an Express server and log the port it's running on. Prior to 1.2, the Express server used express.json() without a size limit, which could allow attackers to send extremely large request bodies. This can cause excessive memory usage, degraded performance, or process crashes, resulting in a Denial of Service (DoS). Any application using the JSON parser without limits and exposed to untrusted clients is affected. The issue is not a flaw in Express itself, but in configuration. This issue is fixed in version 1.2. To work around, consider adding a limit option to the JSON parser, rate limiting at the application or reverse-proxy level, rejecting unusually large requests before parsing, or using a reverse proxy (such as NGINX) to enforce maximum request body sizes.
Title Servify Express does not enforce rate limiting when parsing JSON
Weaknesses CWE-400
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Servify-express.js Servify Express
Servify-express Project Servify-express
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-12T20:44:17.680Z

Reserved: 2025-12-10T20:04:28.290Z

Link: CVE-2025-67731

cve-icon Vulnrichment

Updated: 2025-12-12T20:44:12.411Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-12T08:15:48.367

Modified: 2026-03-17T19:40:55.690

Link: CVE-2025-67731

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-14T21:16:22Z

Weaknesses