Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24006: CWE-770: Allocation of Resources Without Limits or Throttling in lxsmnsyc seroval

0
High
VulnerabilityCVE-2026-24006cvecve-2026-24006cwe-770
Published: Thu Jan 22 2026 (01/22/2026, 02:32:31 UTC)
Source: CVE Database V5
Vendor/Project: lxsmnsyc
Product: seroval

Description

CVE-2026-24006 is a high-severity vulnerability in the lxsmnsyc seroval library versions prior to 1. 4. 1. The issue arises from the lack of limits on resource allocation during serialization of deeply nested JavaScript objects, which can cause the call stack to exceed its maximum limit, leading to denial of service. The vulnerability does not impact confidentiality or integrity but results in availability disruption. The patched version 1. 4. 1 introduces a depthLimit parameter that prevents excessive recursion by throwing an error when the depth limit is reached. Exploitation requires no privileges or user interaction and can be triggered remotely by providing crafted input to the serialization functions. European organizations using seroval in their software stacks, especially in web applications or services that handle complex JSON-like data, are at risk of service outages.

AI-Powered Analysis

AILast updated: 01/22/2026, 03:05:36 UTC

Technical Analysis

CVE-2026-24006 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the seroval library by lxsmnsyc, which facilitates JavaScript value stringification beyond the capabilities of JSON.stringify. Versions prior to 1.4.1 do not impose limits on the depth of object serialization, allowing attackers to craft deeply nested objects that cause the serialization process to exceed the maximum call stack size. This results in a stack overflow condition that crashes the process or service, effectively causing a denial of service (DoS). The vulnerability is exploitable remotely without authentication or user interaction, as it only requires feeding maliciously crafted input to the serialization functions. The introduction of the depthLimit parameter in version 1.4.1 mitigates this risk by enforcing a maximum recursion depth and throwing an error when exceeded, preventing stack overflow. The CVSS v3.1 score is 7.5 (high), reflecting the ease of exploitation and impact on availability, while confidentiality and integrity remain unaffected. No known exploits are currently reported in the wild, but the potential for DoS attacks exists, especially in environments processing untrusted or user-supplied data. The vulnerability is particularly relevant for web applications, APIs, and services that rely on seroval for complex data serialization, as these are common targets for resource exhaustion attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk of denial of service, potentially disrupting critical web services, APIs, and backend systems that utilize seroval for data serialization. The impact is primarily on availability, which can lead to service outages, degraded user experience, and operational downtime. Industries such as finance, telecommunications, healthcare, and government services that rely on JavaScript-based applications or microservices could face interruptions affecting business continuity. Additionally, organizations exposed to public internet traffic are at higher risk since exploitation requires no authentication. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational threat. Given the high CVSS score and ease of exploitation, attackers could leverage this vulnerability to cause widespread disruption, especially in environments processing complex or user-generated data structures. The absence of known exploits in the wild suggests a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

To mitigate CVE-2026-24006, European organizations should immediately upgrade all instances of the seroval library to version 1.4.1 or later, which includes the depthLimit parameter to prevent excessive recursion during serialization. Where upgrading is not immediately feasible, implement input validation to restrict the depth and complexity of objects before serialization, thereby reducing the risk of stack overflow. Employ runtime monitoring and alerting for abnormal CPU and memory usage patterns associated with serialization processes to detect potential exploitation attempts. Incorporate rate limiting and request throttling on APIs and services that accept serialized input to limit the impact of resource exhaustion attacks. Conduct code audits to identify and refactor any custom serialization logic that may be vulnerable to similar issues. Finally, maintain an inventory of software dependencies to ensure timely application of security patches and monitor vulnerability advisories related to third-party libraries.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T18:49:20.659Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697190914623b1157c0cb802

Added to database: 1/22/2026, 2:50:57 AM

Last enriched: 1/22/2026, 3:05:36 AM

Last updated: 1/22/2026, 5:06:01 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats