CVE-2026-8159
multiparty vulnerable to ReDoS via filename parsing
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
[email protected] and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take seconds, blocking the event loop. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: limiting upload sizes at the proxy or gateway layer reduces but does not eliminate the attack surface, since a small header of around 8 KB is sufficient to trigger the vulnerable backtracking. Upgrade to [email protected] or higher.
| CWE | CWE-1333 |
| Vendor | multiparty |
| Product | multiparty |
| Published | May 12, 2026 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for multiparty multiparty
Be the first to know when new high vulnerabilities affecting multiparty multiparty are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Affected Versions
multiparty / multiparty
0 ≤ 4.2.3
References
Credits
aszx87410 Blake Embrey Ulises Gascón