VYPR
High severityNVD Advisory· Published Mar 12, 2026· Updated Mar 13, 2026

undici is vulnerable to Malicious WebSocket 64-bit length overflows undici parser and crashes the client

CVE-2026-1528

Description

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process.

Patches

Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A malicious WebSocket server can crash undici clients by sending a crafted frame with an extremely large 64-bit length, causing a fatal TypeError.

Vulnerability

Details

CVE-2026-1528 describes an integer overflow in undici's ByteParser when processing WebSocket frames that use the 64-bit length form. If a server sends a frame with an extremely large length value, the parser's internal arithmetic overflows, leading to an invalid state. This results in a fatal TypeError that terminates the client process [2][4].

Exploitation

The attack is straightforward: an attacker-controlled WebSocket server sends a specially crafted frame to a vulnerable undici client. No authentication or special network position is required beyond the ability to establish a WebSocket connection. The client does not need to be tricked into sending any data; merely receiving the malicious frame triggers the overflow [4].

Impact

Successful exploitation causes the undici client to crash with an uncaught TypeError, effectively performing a denial of service (DoS) against the application using undici. Since undici is a core HTTP/1.1 client for Node.js, this can disrupt any service that relies on it for WebSocket communication [2][4].

Mitigation

The vulnerability is patched in undici versions v7.24.0 and v6.24.0. Users should upgrade to these or later versions immediately. No workarounds are available [4].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
undicinpm
>= 6.0.0, < 6.24.06.24.0
undicinpm
>= 7.0.0, < 7.24.07.24.0

Affected products

1
  • undici/undiciv5
    Range: >= 6.0.0 < 6.24.0; 7.0.0 < 7.24.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.