Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-84hm-wfh8-c5pg | sse-channel: SSE Injection via unsanitized event fields |
Thu, 14 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rexxars
Rexxars sse-channel |
|
| Vendors & Products |
Rexxars
Rexxars sse-channel |
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | sse-channel is an SSE-implementation which can be used to any node.js http request/response stream. Prior to 4.0.1, implementations that allow user-provided values to be passed to event, retry or id fields are susceptible to event spoofing, where an attacker could inject arbitrary messages into the stream. This vulnerability is fixed in 4.0.1. | |
| Title | sse-channel: SSE Injection via unsanitized event fields | |
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T19:52:02.383Z
Reserved: 2026-05-05T15:13:47.572Z
Link: CVE-2026-44217
Updated: 2026-05-14T19:51:38.030Z
Status : Deferred
Published: 2026-05-12T20:16:42.513
Modified: 2026-05-13T18:21:10.270
Link: CVE-2026-44217
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:36:13Z
Github GHSA