Skip to content

Commit 36b33cf

Browse files
authored
blog: Nov 2025 Security Releases (#2121)
1 parent 7a32b3f commit 36b33cf

File tree

1 file changed

+34
-0
lines changed

1 file changed

+34
-0
lines changed
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
title: November 2025 Security Releases
3+
description: Security release for body-parser has been published. We recommend that all users upgrade as soon as possible.
4+
tags: security vulnerabilities
5+
authors:
6+
- name: Ulises Gascón
7+
github: UlisesGascon
8+
---
9+
10+
The Express team has released a new patch version of [body-parser](https://www.npmjs.com/package/body-parser) addressing a moderate-severity security vulnerability.
11+
12+
13+
{% include admonitions/warning.html
14+
content="We recommend upgrading to the latest version of body-parser to secure your applications."
15+
%}
16+
17+
The following vulnerabilities have been addressed:
18+
19+
- [CVE-2025-13466 in body-parser middleware (Moderate)](#cve-2025-13466-in-body-parser-middleware-moderate)
20+
21+
## CVE-2025-13466 in Body-parser middleware (Moderate)
22+
23+
**[body-parser](https://www.npmjs.com/package/body-parser) version `2.2.0` is vulnerable to denial of service when url encoding is used**
24+
25+
body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic.
26+
27+
**Affected versions**: `2.2.0`
28+
**Patched version**: `>= 2.2.1`
29+
30+
For more details, see [GHSA-wqch-xfxh-vrr4](https://github.com/expressjs/body-parser/security/advisories/GHSA-wqch-xfxh-vrr4).
31+
32+
---
33+
34+
We recommend upgrading to the latest version of body-parser to secure your applications.

0 commit comments

Comments
 (0)