Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pillarjs
Pillarjs multiparty |
|
| CPEs | cpe:2.3:a:pillarjs:multiparty:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Pillarjs
Pillarjs multiparty |
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Multiparty
Multiparty multiparty |
|
| Vendors & Products |
Multiparty
Multiparty multiparty |
Tue, 12 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or toString, the parser invokes .push() on the inherited prototype value rather than an array, throwing a TypeError that propagates as an uncaught exception and crashes the process. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: none. Upgrade to multiparty@4.3.0 or higher. | |
| Title | multiparty vulnerable to Denial of Service via Prototype Pollution leading to Uncaught Exception | |
| Weaknesses | CWE-1321 CWE-248 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: openjs
Published:
Updated: 2026-05-12T12:32:10.127Z
Reserved: 2026-05-08T10:38:20.438Z
Link: CVE-2026-8161
Updated: 2026-05-12T12:32:04.313Z
Status : Analyzed
Published: 2026-05-12T10:16:48.987
Modified: 2026-05-13T14:43:57.590
Link: CVE-2026-8161
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:39:15Z