VYPR

npm package

qs

pkg:npm/qs

Vulnerabilities (6)

  • CVE-2026-2391Feb 12, 2026
    affected >= 6.7.0, < 6.14.2fixed 6.14.2

    ### Summary The `arrayLimit` option in qs does not enforce limits for comma-separated values when `comma: true` is enabled, allowing attackers to cause denial-of-service via memory exhaustion. This is a bypass of the array limit enforcement, similar to the bracket notation bypass

  • CVE-2025-15284Dec 29, 2025
    affected < 6.14.1fixed 6.14.1

    Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1. Summary The arrayLimit option in qs did not enforce limits for bracket notation (a[]=1&a[]=2), only for indexed notation (a[0]=1). This is a consistency bug; arrayLim

  • CVE-2022-24999Nov 26, 2022
    affected >= 6.10.0, < 6.10.3fixed 6.10.3

    qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payloa

  • CVE-2014-10064May 31, 2018
    affected < 1.0.0fixed 1.0.0

    The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condi

  • CVE-2017-1000048HigJul 17, 2017
    affected < 6.0.4fixed 6.0.4

    the web framework using ljharb's qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash.

  • CVE-2014-7191Oct 19, 2014
    affected < 1.0.0fixed 1.0.0

    The qs module before 1.0.0 in Node.js does not call the compact function for array data, which allows remote attackers to cause a denial of service (memory consumption) by using a large index value to create a sparse array.