undici is vulnerable to Malicious WebSocket 64-bit length overflows undici parser and crashes the client
Description
ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process.
Patches
Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A malicious WebSocket server can crash undici clients by sending a crafted frame with an extremely large 64-bit length, causing a fatal TypeError.
Vulnerability
Details
CVE-2026-1528 describes an integer overflow in undici's ByteParser when processing WebSocket frames that use the 64-bit length form. If a server sends a frame with an extremely large length value, the parser's internal arithmetic overflows, leading to an invalid state. This results in a fatal TypeError that terminates the client process [2][4].
Exploitation
The attack is straightforward: an attacker-controlled WebSocket server sends a specially crafted frame to a vulnerable undici client. No authentication or special network position is required beyond the ability to establish a WebSocket connection. The client does not need to be tricked into sending any data; merely receiving the malicious frame triggers the overflow [4].
Impact
Successful exploitation causes the undici client to crash with an uncaught TypeError, effectively performing a denial of service (DoS) against the application using undici. Since undici is a core HTTP/1.1 client for Node.js, this can disrupt any service that relies on it for WebSocket communication [2][4].
Mitigation
The vulnerability is patched in undici versions v7.24.0 and v6.24.0. Users should upgrade to these or later versions immediately. No workarounds are available [4].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
undicinpm | >= 6.0.0, < 6.24.0 | 6.24.0 |
undicinpm | >= 7.0.0, < 7.24.0 | 7.24.0 |
Affected products
1- undici/undiciv5Range: >= 6.0.0 < 6.24.0; 7.0.0 < 7.24.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.