CVE-2026-21717
CVSS Score
5.9
EPSS Score
0.0%
EPSS Percentile
0th
A flaw in V8's string hashing mechanism causes integer-like strings to be hashed to their numeric value, making hash collisions trivially predictable. By crafting a request that causes many such collisions in V8's internal string table, an attacker can significantly degrade performance of the Node.js process. The most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table. This vulnerability affects **20.x, 22.x, 24.x, and 25.x**.
| Vendor | nodejs |
| Product | node |
| Ecosystems | |
| Industries | Technology |
| Published | Mar 30, 2026 |
| Last Updated | Mar 30, 2026 |
Stay Ahead of the Next One
Get instant alerts for nodejs node
Be the first to know when new medium vulnerabilities affecting nodejs node are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Versions
nodejs / node
20.20.1 โค 20.20.1 22.22.1 โค 22.22.1 24.14.0 โค 24.14.0 25.8.1 โค 25.8.1 4.0 < 4.* 5.0 < 5.* 6.0 < 6.* 7.0 < 7.* 8.0 < 8.* 9.0 < 9.* 10.0 < 10.* 11.0 < 11.* 12.0 < 12.* 13.0 < 13.* 14.0 < 14.* 15.0 < 15.* 16.0 < 16.* 17.0 < 17.* 18.0 < 18.* 19.0 < 19.*