Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-8162
PUBLISHED
More InfoOfficial Page
Assigner-openjs
Assigner Org ID-ce714d77-add3-4f53-aff5-83d477b104bb
View Known Exploited Vulnerability (KEV) details
Published At-12 May, 2026 | 09:05
Updated At-12 May, 2026 | 09:05
Rejected At-
▼CVE Numbering Authority (CNA)
multiparty vulnerable to Denial of Service via Uncaught Exception in filename* parameter parsing

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser invokes decodeURI on the value without try/catch. The resulting URIError propagates as an uncaught exception and crashes the process. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: none. Upgrade to multiparty@4.3.0 or higher.

Affected Products
Vendor
multiparty
Product
multiparty
Default Status
unaffected
Versions
Affected
  • From 0 through 4.2.3 (semver)
Unaffected
  • 4.3.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-755CWE-755: Improper Handling of Exceptional Conditions
Type: CWE
CWE ID: CWE-755
Description: CWE-755: Improper Handling of Exceptional Conditions
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Byambadalai Sumiya
remediation developer
Blake Embrey
remediation reviewer
Ulises Gascón
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/pillarjs/multiparty/security/advisories/GHSA-xh3c-6gcq-g4rv
N/A
https://cna.openjsf.org/security-advisories.html
N/A
Hyperlink: https://github.com/pillarjs/multiparty/security/advisories/GHSA-xh3c-6gcq-g4rv
Resource: N/A
Hyperlink: https://cna.openjsf.org/security-advisories.html
Resource: N/A
Details not found