Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hpwf-8g29-85qm | Nest Affected by DoS via Recursive handleData in JsonSocket (TCP Transport) |
Fri, 24 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nestjs:nest:*:*:*:*:*:node.js:*:* |
Wed, 22 Apr 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nestjs
Nestjs nest |
|
| Vendors & Products |
Nestjs
Nestjs nest |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.19, when an attacker sends many small, valid JSON messages in one TCP frame, handleData() recurses once per message; the buffer shrinks each call. maxBufferSize is never reached; call stack overflows instead. A ~47 KB payload is sufficient to trigger RangeError. This vulnerability is fixed in 11.1.19. | |
| Title | Nest: DoS via Recursive handleData in JsonSocket (TCP Transport) | |
| Weaknesses | CWE-674 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T19:38:04.805Z
Reserved: 2026-04-15T15:57:41.719Z
Link: CVE-2026-40879
Updated: 2026-04-21T19:37:59.587Z
Status : Analyzed
Published: 2026-04-21T20:17:01.533
Modified: 2026-04-24T13:46:37.723
Link: CVE-2026-40879
No data.
OpenCVE Enrichment
Updated: 2026-04-22T05:45:09Z
Github GHSA