The most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table.
This vulnerability affects **20.x, 22.x, 24.x, and 25.x**.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6183-1 | nodejs security update |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions | |
| First Time appeared |
Nodejs
Nodejs nodejs |
|
| Weaknesses | CWE-328 CWE-770 |
|
| Vendors & Products |
Nodejs
Nodejs nodejs |
|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 30 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw in V8's string hashing mechanism causes integer-like strings to be hashed to their numeric value, making hash collisions trivially predictable. By crafting a request that causes many such collisions in V8's internal string table, an attacker can significantly degrade performance of the Node.js process. The most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table. This vulnerability affects **20.x, 22.x, 24.x, and 25.x**. | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-05-10T13:16:01.620Z
Reserved: 2026-01-04T15:00:06.575Z
Link: CVE-2026-21717
Updated: 2026-03-30T19:46:07.107Z
Status : Awaiting Analysis
Published: 2026-03-30T20:16:20.010
Modified: 2026-05-10T14:16:47.620
Link: CVE-2026-21717
OpenCVE Enrichment
Updated: 2026-04-03T09:38:07Z
Debian DSA