๐Ÿ” CVE Alert

CVE-2026-44240

HIGH 7.5

basic-ftp allows a malicious FTP server to cause client-side denial of service via unbounded multiline control response buffering

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

basic-ftp is an FTP client for Node.js. Prior to 5.3.1, basic-ftp is vulnerable to client-side denial of service when parsing FTP control-channel multiline responses. A malicious or compromised FTP server can send an unterminated multiline response during the initial FTP banner phase, before authentication. The client keeps appending attacker-controlled data into FtpContext._partialResponse and repeatedly reparses the accumulated buffer without enforcing a maximum control response size. As a result, an application using basic-ftp can remain stuck in connect() while memory and CPU usage grow under attacker-controlled input. This can lead to process-level denial of service, container OOM kills, worker restarts, queue backlog, or service degradation in applications that automatically connect to FTP endpoints. This vulnerability is fixed in 5.3.1.

CWE CWE-400 CWE-770
Vendor patrickjuchli
Product basic-ftp
Published May 12, 2026
Stay Ahead of the Next One

Get instant alerts for patrickjuchli basic-ftp

Be the first to know when new high vulnerabilities affecting patrickjuchli basic-ftp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

patrickjuchli / basic-ftp
< 5.3.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/patrickjuchli/basic-ftp/security/advisories/GHSA-rpmf-866q-6p89