Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22036: CWE-770: Allocation of Resources Without Limits or Throttling in nodejs undici

0
Low
VulnerabilityCVE-2026-22036cvecve-2026-22036cwe-770
Published: Wed Jan 14 2026 (01/14/2026, 19:07:13 UTC)
Source: CVE Database V5
Vendor/Project: nodejs
Product: undici

Description

Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.

AI-Powered Analysis

AILast updated: 01/14/2026, 19:32:06 UTC

Technical Analysis

CVE-2026-22036 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) found in the undici HTTP/1.1 client library for Node.js. Undici versions prior to 6.23.0 and between 7.0.0 and 7.18.2 do not impose limits on the number of links in the decompression chain when handling compressed HTTP responses. This design flaw allows a malicious HTTP server to craft responses with thousands of compression steps, causing the client to consume excessive CPU cycles and allocate large amounts of memory during decompression. The vulnerability can lead to denial of service (DoS) by exhausting system resources, potentially degrading or crashing applications relying on undici for HTTP communication. The issue does not affect confidentiality or integrity, as it is a resource exhaustion problem, and exploitation does not require authentication or user interaction. The CVSS v3.1 score is 3.7 (low), reflecting the network attack vector, high attack complexity, no privileges required, no user interaction, and limited impact to availability. No known exploits have been reported in the wild as of the publication date. The vulnerability was fixed in undici versions 6.23.0 and 7.18.2 by introducing limits on the decompression chain length to prevent resource exhaustion. Organizations using vulnerable undici versions should prioritize upgrading to these fixed releases to mitigate the risk.

Potential Impact

For European organizations, the primary impact of CVE-2026-22036 is the risk of denial of service due to excessive CPU and memory consumption when interacting with malicious or compromised HTTP servers. This can lead to application slowdowns, crashes, or unavailability of services relying on Node.js undici for HTTP client functionality. Enterprises using undici in microservices, API clients, or server-side applications that consume external HTTP services are particularly at risk. Although the vulnerability does not compromise data confidentiality or integrity, service disruption can affect business continuity, user experience, and operational efficiency. In sectors such as finance, telecommunications, and e-commerce, where Node.js is widely used, such disruptions could have cascading effects. The low CVSS score and absence of known exploits suggest a limited immediate threat, but the potential for targeted DoS attacks against critical infrastructure or high-value services remains. Organizations should assess their exposure based on undici usage and the trustworthiness of external HTTP endpoints.

Mitigation Recommendations

To mitigate CVE-2026-22036, European organizations should: 1) Upgrade all instances of undici to version 6.23.0 or 7.18.2 and later, where the decompression chain length is properly limited. 2) Audit and inventory Node.js applications to identify usage of vulnerable undici versions. 3) Implement network-level controls such as firewall rules or proxy filtering to restrict HTTP connections to trusted and verified servers, reducing exposure to malicious endpoints. 4) Monitor application performance and resource usage for unusual spikes that could indicate exploitation attempts. 5) Employ rate limiting and timeout settings on HTTP clients to prevent prolonged resource consumption. 6) Incorporate security testing in CI/CD pipelines to detect usage of vulnerable dependencies. 7) Educate developers about safe handling of compressed HTTP responses and the importance of timely dependency updates. These steps go beyond generic patching by emphasizing proactive network and application-level controls tailored to the vulnerability's exploitation vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-05T22:30:38.719Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6967ebd9f809b25a98d9ca09

Added to database: 1/14/2026, 7:17:45 PM

Last enriched: 1/14/2026, 7:32:06 PM

Last updated: 1/14/2026, 8:50:02 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats