Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32630: CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) in sindresorhus file-type

0
Medium
VulnerabilityCVE-2026-32630cvecve-2026-32630cwe-409
Published: Fri Mar 13 2026 (03/13/2026, 20:54:16 UTC)
Source: CVE Database V5
Vendor/Project: sindresorhus
Product: file-type

Description

CVE-2026-32630 is a medium severity vulnerability in the sindresorhus file-type library versions 20. 0. 0 through 21. 3. 1. It involves improper handling of highly compressed ZIP data during file type detection, leading to excessive memory consumption. The issue arises because the ZIP inflate output limit is enforced only for stream-based detection, not for known-size inputs, allowing a small crafted ZIP file to expand into a much larger payload in memory. This can cause denial of service due to resource exhaustion when functions like fileTypeFromBuffer(), fileTypeFromBlob(), or fileTypeFromFile() process malicious inputs. The vulnerability is fixed in version 21. 3.

AI-Powered Analysis

AILast updated: 03/13/2026, 21:29:39 UTC

Technical Analysis

The vulnerability CVE-2026-32630 affects the sindresorhus file-type library, a popular JavaScript/TypeScript utility used to detect file types from buffers, blobs, or files. Versions from 20.0.0 up to but not including 21.3.2 improperly handle highly compressed ZIP files during type detection. Specifically, when processing ZIP-based formats such as OOXML, the library decompresses the input data without enforcing an inflate output size limit for known-size inputs. While stream-based detection enforces this limit to prevent excessive memory usage, the lack of such a limit for buffer-based inputs allows an attacker to craft a small ZIP file that decompresses into a significantly larger payload. This leads to excessive memory growth and potential denial of service (DoS) conditions due to resource exhaustion. The vulnerability is categorized under CWE-409 (Improper Handling of Highly Compressed Data/Data Amplification). The CVSS v3.1 base score is 5.3 (medium severity), reflecting network attack vector, no privileges or user interaction required, and impact limited to availability (memory exhaustion). No known exploits have been reported in the wild. The issue was addressed in version 21.3.2 of the file-type library.

Potential Impact

This vulnerability primarily impacts the availability of systems using vulnerable versions of the file-type library. An attacker can cause excessive memory consumption by submitting crafted ZIP files, potentially leading to application crashes or degraded performance. This can result in denial of service, affecting services that rely on file-type for file validation or processing, such as web servers, file upload handlers, or malware scanners. Since the vulnerability does not affect confidentiality or integrity, the risk is limited to service disruption. However, given the widespread use of the file-type library in Node.js applications globally, the impact could be significant in environments processing untrusted file inputs. The lack of required authentication or user interaction increases the risk of remote exploitation. Organizations with automated file processing pipelines or public-facing APIs that accept file uploads are particularly at risk.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade the sindresorhus file-type library to version 21.3.2 or later, where the issue is fixed. If immediate upgrade is not feasible, implement input validation to reject suspiciously small ZIP files that decompress to large sizes or limit the size of files accepted for processing. Employ resource monitoring and limits on memory usage for processes handling file-type operations to prevent system-wide impact. Consider sandboxing or isolating file processing components to contain potential denial of service effects. Additionally, review application logic to avoid relying solely on file-type for security decisions without complementary checks. Monitoring for abnormal memory usage patterns during file uploads can help detect exploitation attempts. Finally, keep dependencies up to date and subscribe to security advisories for timely awareness of such vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-12T15:29:36.559Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b47e482f860ef943b3ab73

Added to database: 3/13/2026, 9:14:48 PM

Last enriched: 3/13/2026, 9:29:39 PM

Last updated: 3/13/2026, 10:34:15 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses