@fastify/accepts-serializer cached serializer-selection results keyed by the request Accept header without a size limit or eviction policy. A remote unauthenticated client could send many distinct but matching Accept header variants to make the cache grow unbounded, eventually exhausting the Node.js heap and crashing the process. Versions <= 6.0.3 are affected. Update to 6.0.4 or later, which bounds the cache via an LRU with a default size of 100 entries, configurable through the new cacheSize plugin option.
Metrics
Affected Vendors & Products
References
History
Mon, 04 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | @fastify/accepts-serializer cached serializer-selection results keyed by the request Accept header without a size limit or eviction policy. A remote unauthenticated client could send many distinct but matching Accept header variants to make the cache grow unbounded, eventually exhausting the Node.js heap and crashing the process. Versions <= 6.0.3 are affected. Update to 6.0.4 or later, which bounds the cache via an LRU with a default size of 100 entries, configurable through the new cacheSize plugin option. | |
| Title | @fastify/accepts-serializer vulnerable to Denial of Service via Unbounded Accept Header Cache Growth | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: openjs
Published:
Updated: 2026-05-04T19:50:16.465Z
Reserved: 2026-05-04T11:50:02.918Z
Link: CVE-2026-7768
Updated: 2026-05-04T19:50:12.504Z
Status : Received
Published: 2026-05-04T20:16:21.107
Modified: 2026-05-04T20:16:21.107
Link: CVE-2026-7768
No data.
OpenCVE Enrichment
Updated: 2026-05-04T20:30:08Z