← Volver a CVEs
CVE-2026-25224
LOW3.7
Descripcion
Fastify is a fast and low overhead web framework, for Node.js. Prior to version 5.7.3, a denial-of-service vulnerability in Fastify’s Web Streams response handling can allow a remote client to exhaust server memory. Applications that return a ReadableStream (or Response with a Web Stream body) via reply.send() are impacted. A slow or non-reading client can trigger unbounded buffering when backpressure is ignored, leading to process crashes or severe degradation. This issue has been patched in version 5.7.3.
Detalles CVE
Puntuacion CVSS v3.13.7
SeveridadLOW
Vector CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Vector de ataqueNETWORK
ComplejidadHIGH
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado2/3/2026
Ultima modificacion2/10/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
fastify:fastify
Debilidades (CWE)
CWE-770
Referencias
https://github.com/fastify/fastify/commit/eb11156396f6a5fedaceed0140aed2b7f026be37(security-advisories@github.com)
https://github.com/fastify/fastify/security/advisories/GHSA-mrq3-vjjr-p77c(security-advisories@github.com)
https://hackerone.com/reports/3524779(security-advisories@github.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.