Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pillarjs
Pillarjs multiparty |
|
| CPEs | cpe:2.3:a:pillarjs:multiparty:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Pillarjs
Pillarjs multiparty |
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Multiparty
Multiparty multiparty |
|
| Vendors & Products |
Multiparty
Multiparty multiparty |
Tue, 12 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take seconds, blocking the event loop. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: limiting upload sizes at the proxy or gateway layer reduces but does not eliminate the attack surface, since a small header of around 8 KB is sufficient to trigger the vulnerable backtracking. Upgrade to multiparty@4.3.0 or higher. | |
| Title | multiparty vulnerable to ReDoS via filename parsing | |
| Weaknesses | CWE-1333 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: openjs
Published:
Updated: 2026-05-12T12:33:59.418Z
Reserved: 2026-05-08T09:45:28.532Z
Link: CVE-2026-8159
Updated: 2026-05-12T12:33:56.826Z
Status : Analyzed
Published: 2026-05-12T10:16:48.857
Modified: 2026-05-13T14:44:31.283
Link: CVE-2026-8159
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:39:16Z