Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. body-parser
  4. ›
  5. CVE-2025-13466

CVE-2025-13466: body-parser is vulnerable to denial of service when url encoding is used

November 25, 2025

body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic.

References

  • github.com/advisories/GHSA-wqch-xfxh-vrr4
  • github.com/expressjs/body-parser
  • github.com/expressjs/body-parser/commit/b204886a6744b0b6d297cd0e849d75de836f3b63
  • github.com/expressjs/body-parser/releases/tag/v2.2.1
  • github.com/expressjs/body-parser/security/advisories/GHSA-wqch-xfxh-vrr4
  • nvd.nist.gov/vuln/detail/CVE-2025-13466

Code Behaviors & Features

Detect and mitigate CVE-2025-13466 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.2.1

Fixed versions

  • 2.2.1

Solution

Upgrade to version 2.2.1 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-400: Uncontrolled Resource Consumption

Source file

npm/body-parser/CVE-2025-13466.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 04 Dec 2025 12:20:17 +0000.