Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-8159
PUBLISHED
More InfoOfficial Page
Assigner-openjs
Assigner Org ID-ce714d77-add3-4f53-aff5-83d477b104bb
View Known Exploited Vulnerability (KEV) details
Published At-12 May, 2026 | 08:35
Updated At-12 May, 2026 | 08:35
Rejected At-
▼CVE Numbering Authority (CNA)
multiparty vulnerable to ReDoS via filename parsing

multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take seconds, blocking the event loop. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: limiting upload sizes at the proxy or gateway layer reduces but does not eliminate the attack surface, since a small header of around 8 KB is sufficient to trigger the vulnerable backtracking. Upgrade to multiparty@4.3.0 or higher.

Affected Products
Vendor
multiparty
Product
multiparty
Default Status
unaffected
Versions
Affected
  • From 0 through 4.2.3 (semver)
Unaffected
  • 4.3.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-1333CWE-1333: Inefficient Regular Expression Complexity
Type: CWE
CWE ID: CWE-1333
Description: CWE-1333: Inefficient Regular Expression Complexity
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
aszx87410
remediation developer
Blake Embrey
remediation reviewer
Ulises Gascón
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/pillarjs/multiparty/security/advisories/GHSA-65x3-rw7q-gx94
N/A
https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
N/A
https://cna.openjsf.org/security-advisories.html
N/A
Hyperlink: https://github.com/pillarjs/multiparty/security/advisories/GHSA-65x3-rw7q-gx94
Resource: N/A
Hyperlink: https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
Resource: N/A
Hyperlink: https://cna.openjsf.org/security-advisories.html
Resource: N/A
Details not found