Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2x79-gwq3-vxxm | Uncontrolled resource consumption and loop with unreachable exit condition in facil.io and downstream iodine ruby gem |
Wed, 22 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Boazsegev
Boazsegev facil.io Boazsegev iodine |
|
| Vendors & Products |
Boazsegev
Boazsegev facil.io Boazsegev iodine |
Wed, 22 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | facil.io is a C micro-framework for web applications. Prior to commit 5128747363055201d3ecf0e29bf0a961703c9fa0, `fio_json_parse` can enter an infinite loop when it encounters a nested JSON value starting with `i` or `I`. The process spins in user space and pegs one CPU core at ~100% instead of returning a parse error. Because `iodine` vendors the same parser code, the issue also affects `iodine` when it parses attacker-controlled JSON. The smallest reproducer I found is `[i`. The quoted-value form that originally exposed the issue, `[""i`, reaches the same bug because the parser tolerates missing commas and then treats the trailing `i` as the start of another value. Commit 5128747363055201d3ecf0e29bf0a961703c9fa0 fixes the issue. | |
| Title | facil.io and downstream iodine ruby gem vulnerable to uncontrolled resource consumption and loop with unreachable exit condition | |
| Weaknesses | CWE-400 CWE-835 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-22T13:09:38.075Z
Reserved: 2026-04-17T12:59:15.739Z
Link: CVE-2026-41146
Updated: 2026-04-22T13:09:26.346Z
Status : Deferred
Published: 2026-04-22T02:16:02.237
Modified: 2026-04-29T20:46:33.890
Link: CVE-2026-41146
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:44:52Z
Github GHSA