ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process.

Patches

Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 12 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Description ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.
Title undici is vulnerable to Malicious WebSocket 64-bit length overflows undici parser and crashes the client
Weaknesses CWE-1284
CWE-248
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: openjs

Published:

Updated: 2026-03-12T20:21:57.775Z

Reserved: 2026-01-28T12:05:10.024Z

Link: CVE-2026-1528

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-12T21:16:25.330

Modified: 2026-03-12T21:16:25.330

Link: CVE-2026-1528

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses