Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qgc4-8p88-4w7m | Servify-express rate limit issue |
Tue, 17 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Servify-express.js
Servify-express.js servify Express |
|
| CPEs | cpe:2.3:a:servify-express.js:servify_express:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Servify-express.js
Servify-express.js servify Express |
|
| Metrics |
cvssV3_1
|
Sun, 14 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Servify-express Project
Servify-express Project servify-express |
|
| Vendors & Products |
Servify-express Project
Servify-express Project servify-express |
Fri, 12 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Servify Express is a Node.js package to start an Express server and log the port it's running on. Prior to 1.2, the Express server used express.json() without a size limit, which could allow attackers to send extremely large request bodies. This can cause excessive memory usage, degraded performance, or process crashes, resulting in a Denial of Service (DoS). Any application using the JSON parser without limits and exposed to untrusted clients is affected. The issue is not a flaw in Express itself, but in configuration. This issue is fixed in version 1.2. To work around, consider adding a limit option to the JSON parser, rate limiting at the application or reverse-proxy level, rejecting unusually large requests before parsing, or using a reverse proxy (such as NGINX) to enforce maximum request body sizes. | |
| Title | Servify Express does not enforce rate limiting when parsing JSON | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-12T20:44:17.680Z
Reserved: 2025-12-10T20:04:28.290Z
Link: CVE-2025-67731
Updated: 2025-12-12T20:44:12.411Z
Status : Analyzed
Published: 2025-12-12T08:15:48.367
Modified: 2026-03-17T19:40:55.690
Link: CVE-2025-67731
No data.
OpenCVE Enrichment
Updated: 2025-12-14T21:16:22Z
Github GHSA