CVE-2025-47279: undici Denial of Service attack via bad certificate data

3.1 CVSS

Description

Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to implement a webhook-like system are vulnerable. If the attacker set up a server with an invalid certificate, and they can force the application to call the webhook repeatedly, then they can cause a memory leak. This has been patched in versions 5.29.0, 6.21.2, and 7.5.0. As a workaound, avoid calling a webhook repeatedly if the webhook fails.

Classification

CVE ID: CVE-2025-47279

CVSS Base Severity: LOW

CVSS Base Score: 3.1

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

Problem Types

CWE-401: Missing Release of Memory after Effective Lifetime

Affected Products

Vendor: nodejs

Product: undici

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 7.76% (scored less or equal to compared to others)

EPSS Date: 2025-06-06 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-47279
https://github.com/nodejs/undici/security/advisories/GHSA-cxrh-j4jr-qwg3
https://github.com/nodejs/undici/issues/3895
https://github.com/nodejs/undici/pull/4088

Timeline