CVE-2025-13466

EUVD-2025-198982
body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic.
This issue is addressed in version 2.2.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
UNKNOWN
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
Debian logo
Debian Releases
Debian Product
Codename
node-body-parser
bookworm
1.20.1+~1.19.2-1
not-affected
bullseye
1.19.0-2
not-affected
forky
2.2.2+~1.19.6-1
fixed
sid
2.2.2+~1.19.6-1
fixed
trixie
1.20.3+~1.19.5-3
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
node-body-parser
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
noble
needs-triage
plucky
ignored
questing
needs-triage
xenial
needs-triage