GHSA-66FC-RW6M-C2Q6
Vulnerability from github – Published: 2026-01-21 17:05 – Updated: 2026-01-22 15:44
VLAI?
Summary
Seroval affected by Denial of Service via Array serialization
Details
Overriding encoded array lengths by replacing them with an excessively large value causes the deserialization process to significantly increase processing time.
Mitigation:
Seroval no longer encodes array lengths.
Instead, it computes length using Array.prototype.length during deserialization.
Severity ?
7.5 (High)
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 1.4.0"
},
"package": {
"ecosystem": "npm",
"name": "seroval"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-23957"
],
"database_specific": {
"cwe_ids": [
"CWE-770"
],
"github_reviewed": true,
"github_reviewed_at": "2026-01-21T17:05:54Z",
"nvd_published_at": "2026-01-22T02:15:52Z",
"severity": "HIGH"
},
"details": "Overriding encoded array lengths by replacing them with an excessively large value causes the deserialization process to **significantly increase processing time**. \n\n**Mitigation**: \n`Seroval` no longer encodes array lengths.\nInstead, it computes length using `Array.prototype.length` during deserialization.",
"id": "GHSA-66fc-rw6m-c2q6",
"modified": "2026-01-22T15:44:01Z",
"published": "2026-01-21T17:05:54Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/lxsmnsyc/seroval/security/advisories/GHSA-66fc-rw6m-c2q6"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23957"
},
{
"type": "WEB",
"url": "https://github.com/lxsmnsyc/seroval/commit/ce9408ebc87312fcad345a73c172212f2a798060"
},
{
"type": "PACKAGE",
"url": "https://github.com/lxsmnsyc/seroval"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Seroval affected by Denial of Service via Array serialization"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…