Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g2pg-6438-jwpf | devalue vulnerable to denial of service due to memory/CPU exhaustion in devalue.parse |
Tue, 20 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:svelte:devalue:*:*:*:*:*:node.js:*:* |
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Svelte
Svelte devalue |
|
| Vendors & Products |
Svelte
Svelte devalue |
Fri, 16 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 15 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.1.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. The root cause is the ArrayBuffer hydration expecting base64 encoded strings as input, but not checking the assumption before decoding the input. This vulnerability is fixed in 5.6.2. | |
| Title | devalue vulnerable to denial of service due to memory/CPU exhaustion in devalue.parse | |
| Weaknesses | CWE-405 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-15T19:22:56.774Z
Reserved: 2026-01-09T18:27:19.387Z
Link: CVE-2026-22775
Updated: 2026-01-15T19:22:54.448Z
Status : Analyzed
Published: 2026-01-15T19:16:05.963
Modified: 2026-01-20T15:29:35.663
Link: CVE-2026-22775
OpenCVE Enrichment
Updated: 2026-04-18T16:15:04Z
Github GHSA