๐Ÿ” CVE Alert

CVE-2026-34043

MEDIUM 5.9

Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects

CVSS Score
5.9
EPSS Score
0.0%
EPSS Percentile
11th

Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.

CWE CWE-400 CWE-834
Vendor yahoo
Product serialize-javascript
Published Mar 31, 2026
Last Updated Mar 31, 2026
Stay Ahead of the Next One

Get instant alerts for yahoo serialize-javascript

Be the first to know when new medium vulnerabilities affecting yahoo serialize-javascript are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

yahoo / serialize-javascript
< 7.0.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-qj8w-gfj5-8c6v github.com: https://github.com/yahoo/serialize-javascript/commit/f147e90269b58bb6e539cfdf3d0e20d6ad14204b github.com: https://github.com/yahoo/serialize-javascript/releases/tag/v7.0.5