CVE-2025-13466: body-parser is vulnerable to denial of service when url encoding is used
body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic.
References
- github.com/advisories/GHSA-wqch-xfxh-vrr4
- github.com/expressjs/body-parser
- github.com/expressjs/body-parser/commit/b204886a6744b0b6d297cd0e849d75de836f3b63
- github.com/expressjs/body-parser/releases/tag/v2.2.1
- github.com/expressjs/body-parser/security/advisories/GHSA-wqch-xfxh-vrr4
- nvd.nist.gov/vuln/detail/CVE-2025-13466
Code Behaviors & Features
Detect and mitigate CVE-2025-13466 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →