High severity7.5NVD Advisory· Published May 12, 2026· Updated May 13, 2026
CVE-2026-8162
CVE-2026-8162
Description
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser invokes decodeURI on the value without try/catch. The resulting URIError propagates as an uncaught exception and crashes the process. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: none. Upgrade to multiparty@4.3.0 or higher.
Affected products
1- Range: <=4.2.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- cna.openjsf.org/security-advisories.htmlnvdThird Party Advisory
- github.com/pillarjs/multiparty/security/advisories/GHSA-xh3c-6gcq-g4rvnvdVendor Advisory
News mentions
0No linked articles in our index yet.