Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pillarjs
Pillarjs multiparty |
|
| CPEs | cpe:2.3:a:pillarjs:multiparty:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Pillarjs
Pillarjs multiparty |
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Multiparty
Multiparty multiparty |
|
| Vendors & Products |
Multiparty
Multiparty multiparty |
Tue, 12 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser invokes decodeURI on the value without try/catch. The resulting URIError propagates as an uncaught exception and crashes the process. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: none. Upgrade to multiparty@4.3.0 or higher. | |
| Title | multiparty vulnerable to Denial of Service via Uncaught Exception in filename* parameter parsing | |
| Weaknesses | CWE-755 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: openjs
Published:
Updated: 2026-05-12T12:33:12.647Z
Reserved: 2026-05-08T11:05:42.781Z
Link: CVE-2026-8162
Updated: 2026-05-12T12:33:08.706Z
Status : Analyzed
Published: 2026-05-12T10:16:49.110
Modified: 2026-05-13T14:43:47.950
Link: CVE-2026-8162
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:39:13Z