|
| 1 | +--- |
| 2 | +title: July 2025 Security Releases |
| 3 | +description: Security releases for Multer and On-headers has been published. We recommend that all users upgrade as soon as possible. |
| 4 | +tags: security vulnerabilities |
| 5 | +authors: |
| 6 | + - name: Ulises Gascón |
| 7 | + github: UlisesGascon |
| 8 | +--- |
| 9 | + |
| 10 | +The Express team has released a new patch version of [Multer](https://www.npmjs.com/package/multer) addressing a high-severity security vulnerability, and a new minor version of [on-headers](https://www.npmjs.com/package/on-headers) addressing a low-severity security vulnerability. |
| 11 | + |
| 12 | + |
| 13 | +{% include admonitions/warning.html |
| 14 | +content="We recommend upgrading to the latest version of Multer and On-headers immediately to secure your applications." |
| 15 | +%} |
| 16 | + |
| 17 | +The following vulnerabilities have been addressed: |
| 18 | + |
| 19 | +- [High severity vulnerability CVE-2025-7338 in Multer middleware](#high-severity-vulnerability-cve-2025-7338-in-multer-middleware) |
| 20 | +- [Low severity vulnerability CVE-2025-7339 in On-header middleware](#low-severity-vulnerability-cve-2025-7339-in-on-header-middleware) |
| 21 | + |
| 22 | +## High severity vulnerability CVE-2025-7338 in Multer middleware |
| 23 | + |
| 24 | +**[Multer](https://www.npmjs.com/package/multer) versions `>=1.4.4-lts.1` and `<2.0.2` are vulnerable to denial of service via unhandled exception from malformed request.** |
| 25 | + |
| 26 | +This request causes an unhandled exception, leading to a crash of the process. |
| 27 | + |
| 28 | +**Affected versions**: `>=1.4.4-lts.1, <2.0.2` |
| 29 | +**Patched version**: `2.0.2` |
| 30 | + |
| 31 | +For more details, see [GHSA-fjgf-rc76-4x9p](https://github.com/expressjs/multer/security/advisories/GHSA-fjgf-rc76-4x9p). |
| 32 | + |
| 33 | +## Low severity vulnerability CVE-2025-7339 in On-header middleware |
| 34 | + |
| 35 | +**[On-headers](https://www.npmjs.com/package/on-headers) versions `<1.1.0` is vulnerable to http response header manipulation** |
| 36 | + |
| 37 | +A bug in on-headers versions `<1.1.0` may result in response headers being inadvertently modified when an array is passed to `response.writeHead()` |
| 38 | + |
| 39 | +**Affected versions**: `<1.1.0` |
| 40 | +**Patched version**: `1.1.0` |
| 41 | + |
| 42 | +For more details, see [GHSA-76c9-3jph-rj3q](https://github.com/jshttp/on-headers/security/advisories/GHSA-76c9-3jph-rj3q). |
| 43 | + |
| 44 | +--- |
| 45 | + |
| 46 | +We recommend upgrading to the latest version of Multer and On-headers immediately to secure your applications. |
0 commit comments