CVE-2026-34043

EUVD-2026-17288
Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
GitHub_MCNA
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 4%
Affected Products (NVD)
VendorProductVersion
yahooserialize
𝑥
< 7.0.5
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
yahooserialize_javascript
𝑥
< 7.0.5
CNA
Debian logo
Debian Releases
Debian Product
Codename
node-serialize-javascript
bookworm
no-dsa
bullseye
postponed
forky
7.0.5+~5.0.4-1
fixed
sid
7.0.5+~5.0.4-1
fixed
trixie
no-dsa