Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21714: Vulnerability in nodejs node

0
Medium
VulnerabilityCVE-2026-21714cvecve-2026-21714
Published: Mon Mar 30 2026 (03/30/2026, 19:07:28 UTC)
Source: CVE Database V5
Vendor/Project: nodejs
Product: node

Description

A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0 (connection-level) that cause the flow control window to exceed the maximum value of 2³¹-1. The server correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up. This vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 19:40:39 UTC

Technical Analysis

CVE-2026-21714 is a vulnerability in the Node.js HTTP/2 implementation affecting versions 20.20.1, 22.22.1, 24.14.0, and 25.8.1. The flaw occurs when a malicious client sends WINDOW_UPDATE frames on stream 0 (the connection-level stream) that cause the HTTP/2 flow control window to exceed the maximum allowed value of 2³¹-1 (2,147,483,647). While the Node.js server correctly detects this protocol violation and responds by sending a GOAWAY frame to terminate the connection, it fails to properly clean up the Http2Session object associated with that connection. This results in a memory leak, as the session object remains allocated in memory despite the connection being closed. Over time, repeated exploitation can cause the server to consume increasing amounts of memory, potentially leading to resource exhaustion and denial-of-service (DoS). The vulnerability does not affect confidentiality or integrity since it does not allow data leakage or modification. It is remotely exploitable without authentication or user interaction, making it accessible to any attacker able to establish an HTTP/2 connection to the server. The issue impacts the availability of Node.js HTTP/2 servers, especially those exposed to untrusted clients or the public internet. No patches or mitigations are linked in the provided data, and no known exploits are reported in the wild as of the publication date. The vulnerability was reserved on January 4, 2026, and published on March 30, 2026, with a CVSS v3.0 score of 5.3, reflecting a medium severity level primarily due to its impact on availability and ease of exploitation.

Potential Impact

The primary impact of CVE-2026-21714 is on the availability of Node.js HTTP/2 servers. The memory leak caused by improper cleanup of Http2Session objects can lead to gradual memory exhaustion, resulting in degraded server performance or crashes. This can cause denial-of-service conditions, disrupting services that rely on Node.js HTTP/2 servers. Organizations running web applications, APIs, or microservices on affected Node.js versions are at risk of service interruptions, which can affect user experience, business continuity, and potentially lead to financial losses. Since the vulnerability does not affect confidentiality or integrity, data breaches are not a direct concern. However, the ease of exploitation without authentication means attackers can launch DoS attacks remotely, increasing the threat surface. Large-scale or automated exploitation could impact cloud providers, SaaS platforms, and enterprises with public-facing Node.js HTTP/2 services, especially those with high traffic volumes or limited resource monitoring.

Mitigation Recommendations

Organizations should immediately identify and inventory Node.js HTTP/2 servers running affected versions (20.20.1, 22.22.1, 24.14.0, 25.8.1). The primary mitigation is to apply official patches or updates from the Node.js project once available. In the absence of patches, administrators can implement network-level controls such as rate limiting or filtering to restrict or block suspicious WINDOW_UPDATE frames or abnormal HTTP/2 traffic patterns. Deploying Web Application Firewalls (WAFs) with HTTP/2 protocol anomaly detection can help mitigate exploitation attempts. Monitoring server memory usage and setting alerts for unusual memory growth can provide early warning of exploitation. Additionally, consider disabling HTTP/2 support temporarily if it is not essential or if mitigation controls are insufficient. Regularly review Node.js release notes and security advisories for updates. Finally, ensure that HTTP/2 implementations are hardened by following best practices for flow control and connection management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-04T15:00:06.574Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69cacda7e6bfc5ba1d6188ab

Added to database: 3/30/2026, 7:23:19 PM

Last enriched: 3/30/2026, 7:40:39 PM

Last updated: 3/30/2026, 9:36:02 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses