Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-36xv-jgw5-4q75 | @nestjs/core Improperly Neutralizes Special Elements in Output Used by a Downstream Component ('Injection') |
Fri, 17 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nestjs:nest:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 09 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nestjs
Nestjs nest |
|
| Vendors & Products |
Nestjs
Nestjs nest |
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.18, SseStream._transform() interpolates message.type and message.id directly into Server-Sent Events text protocol output without sanitizing newline characters (\r, \n). Since the SSE protocol treats both \r and \n as field delimiters and \n\n as event boundaries, an attacker who can influence these fields through upstream data sources can inject arbitrary SSE events, spoof event types, and corrupt reconnection state. This vulnerability is fixed in 11.1.18. | |
| Title | @nestjs/core Improperly Neutralizes Special Elements in Output Used by a Downstream Component ('Injection') | |
| Weaknesses | CWE-74 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T15:58:37.067Z
Reserved: 2026-04-03T02:15:39.280Z
Link: CVE-2026-35515
Updated: 2026-04-07T15:49:00.468Z
Status : Analyzed
Published: 2026-04-07T16:16:27.773
Modified: 2026-04-17T20:36:10.247
Link: CVE-2026-35515
OpenCVE Enrichment
Updated: 2026-04-09T08:28:45Z
Github GHSA