Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-j47w-4g3g-c36v | file-type: ZIP Decompression Bomb DoS via [Content_Types].xml entry |
Tue, 17 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sindresorhus:file-type:*:*:*:*:*:node.js:*:* |
Tue, 17 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 16 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sindresorhus
Sindresorhus file-type |
|
| Vendors & Products |
Sindresorhus
Sindresorhus file-type |
Fri, 13 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | file-type detects the file type of a file, stream, or data. From 20.0.0 to 21.3.1, a crafted ZIP file can trigger excessive memory growth during type detection in file-type when using fileTypeFromBuffer(), fileTypeFromBlob(), or fileTypeFromFile(). The ZIP inflate output limit is enforced for stream-based detection, but not for known-size inputs. As a result, a small compressed ZIP can cause file-type to inflate and process a much larger payload while probing ZIP-based formats such as OOXML. This vulnerability is fixed in 21.3.2. | |
| Title | file-type affected by ZIP Decompression Bomb DoS via [Content_Types].xml entry | |
| Weaknesses | CWE-409 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-16T16:59:36.473Z
Reserved: 2026-03-12T15:29:36.559Z
Link: CVE-2026-32630
Updated: 2026-03-16T16:59:24.226Z
Status : Analyzed
Published: 2026-03-16T14:19:40.593
Modified: 2026-03-17T19:05:56.580
Link: CVE-2026-32630
OpenCVE Enrichment
Updated: 2026-03-23T13:39:31Z
Github GHSA