VYPR
Moderate severityNVD Advisory· Published Mar 12, 2026· Updated Mar 13, 2026

undici is vulnerable to Unbounded Memory Consumption in in Undici's DeduplicationHandler via Response Buffering leads to DoS

CVE-2026-2581

Description

This is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Service (DoS).

In vulnerable Undici versions, when interceptors.deduplicate() is enabled, response data for deduplicated requests could be accumulated in memory for downstream handlers. An attacker-controlled or untrusted upstream endpoint can exploit this with large/chunked responses and concurrent identical requests, causing high memory usage and potential OOM process termination.

Impacted users are applications that use Undici’s deduplication interceptor against endpoints that may produce large or long-lived response bodies.

PatchesThe issue has been patched by changing deduplication behavior to stream response chunks to downstream handlers as they arrive (instead of full-body accumulation), and by preventing late deduplication when body streaming has already started.

Users should upgrade to the first official Undici (and Node.js, where applicable) releases that include this patch.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unbounded memory consumption in Undici's deduplication interceptor allows remote attackers to cause denial of service via large/chunked responses.

Undici is an HTTP/1.1 client for Node.js [1]. In vulnerable versions, when interceptors.deduplicate() is enabled, response data for deduplicated requests is fully buffered in memory before being forwarded to downstream handlers [2][4]. This uncontrolled resource consumption (CWE-400) occurs because the interceptor accumulates the entire response body for each unique request, even if subsequent identical requests are made concurrently [2].

An attacker who controls or can influence an upstream HTTP endpoint can trigger the vulnerability by sending large or chunked responses while inducing multiple concurrent identical requests from the target application [2][4]. The attack requires no authentication beyond normal network access to the vulnerable client, and the interceptor must be enabled for the affected route [4].

Successful exploitation leads to high memory usage and can result in process termination due to out-of-memory (OOM) conditions, effectively causing a denial of service (DoS) [2][4]. The impact is limited to applications that use Undici's deduplication interceptor against endpoints that may return large or long-lived response bodies [4].

The issue has been patched by modifying deduplication to stream response chunks as they arrive rather than accumulating the full body, and by preventing late deduplication once body streaming has started [2][4]. Users should upgrade to the first official Undici (and Node.js, where applicable) releases that include this patch [2]. As a workaround, users can disable the deduplication interceptor, skip deduplication for high-risk requests, or apply upstream response-size limits [4].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
undicinpm
>= 7.17.0, < 7.24.07.24.0

Affected products

2
  • Undici/Undicillm-fuzzy
  • undici/undiciv5
    Range: < 6.24.0; 7.0.0 < 7.24.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.