Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59465: Vulnerability in nodejs node

0
High
VulnerabilityCVE-2025-59465cvecve-2025-59465
Published: Tue Jan 20 2026 (01/20/2026, 20:41:55 UTC)
Source: CVE Database V5
Vendor/Project: nodejs
Product: node

Description

CVE-2025-59465 is a high-severity vulnerability in Node. js where a malformed HTTP/2 HEADERS frame containing oversized or invalid HPACK data triggers an unhandled TLSSocket error (ECONNRESET), causing the Node. js process to crash. This leads to a remote denial of service (DoS) condition. The issue primarily affects applications that do not implement explicit error handlers on secure sockets, allowing the crash to propagate and terminate the process. The vulnerability impacts a wide range of Node. js versions, including many currently supported releases. Exploitation requires no authentication or user interaction and can be triggered remotely over the network. Although no known exploits are currently in the wild, the vulnerability's ease of exploitation and potential for service disruption make it a significant threat. Organizations using Node.

AI-Powered Analysis

AILast updated: 01/28/2026, 20:22:39 UTC

Technical Analysis

CVE-2025-59465 is a vulnerability in the Node.js runtime affecting its HTTP/2 implementation. Specifically, when the Node.js server receives a malformed HTTP/2 HEADERS frame containing oversized or invalid HPACK-encoded data, it triggers an unhandled error on the TLSSocket layer, resulting in an ECONNRESET error. Instead of gracefully handling this error and closing the connection, the Node.js process crashes, causing a denial of service. This vulnerability arises because many Node.js applications do not attach explicit error handlers to secure sockets, allowing the unhandled error to propagate and terminate the process. The affected versions span from early major releases (4.0) up to recent ones (25.2.1), indicating a long-standing issue across multiple Node.js versions. The vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), as the malformed frame causes resource exhaustion leading to a crash. The CVSS v3.0 score is 7.5 (high), reflecting network attack vector, no privileges or user interaction required, and a high impact on availability. No patches are linked yet, and no known exploits have been reported in the wild. The vulnerability primarily impacts applications serving HTTP/2 over TLS, which is common in modern web services built on Node.js.

Potential Impact

For European organizations, the impact of CVE-2025-59465 can be significant, especially for those relying on Node.js for critical web services or APIs using HTTP/2 over TLS. A successful exploit can cause service outages by crashing Node.js processes, leading to denial of service conditions that disrupt business operations, customer access, and potentially damage reputation. Industries such as finance, e-commerce, healthcare, and government services that depend on high availability and secure web communications are particularly at risk. The vulnerability does not expose data confidentiality or integrity directly but affects availability, which can indirectly impact trust and compliance with regulations like GDPR if service disruptions affect data access or processing. The ease of remote exploitation without authentication increases the threat level, as attackers can trigger crashes without insider access. Organizations with insufficient error handling or lacking robust process management (e.g., automatic restarts) may experience prolonged downtime.

Mitigation Recommendations

To mitigate CVE-2025-59465, European organizations should: 1) Upgrade Node.js to a version where this vulnerability is patched once available; 2) In the interim, implement explicit error handlers on all secure sockets by attaching 'error' event listeners to TLSSocket instances to prevent unhandled exceptions from crashing the process; 3) Employ robust process management tools (e.g., PM2, systemd) to automatically restart Node.js processes upon crashes to minimize downtime; 4) Monitor HTTP/2 traffic for malformed HEADERS frames or abnormal HPACK data patterns that could indicate exploitation attempts; 5) Apply network-level protections such as rate limiting and Web Application Firewalls (WAFs) configured to detect and block suspicious HTTP/2 frames; 6) Conduct thorough testing of Node.js applications to ensure error handling is comprehensive and resilient; 7) Review and update incident response plans to include scenarios involving DoS via malformed HTTP/2 frames. These steps go beyond generic advice by focusing on specific error handling and operational resilience tailored to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-09-16T15:00:07.875Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 696feab04623b1157c4e3b78

Added to database: 1/20/2026, 8:50:56 PM

Last enriched: 1/28/2026, 8:22:39 PM

Last updated: 2/7/2026, 3:52:48 AM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats