Impact
A flaw in Node.js HTTP request processing causes an uncaught TypeError when a client sends a header named __proto__. The faulty code resolves dest["__proto__"] to Object.prototype and attempts to call .push() on it, leading to a synchronous exception that cannot be caught by standard error handlers. This results in the Node.js process terminating, causing the application to crash and denying service to all users. The vulnerability stems from input validation weakness and improper handling of prototype properties.
Affected Systems
It impacts all Node.js HTTP servers running on versions 20.x, 22.x, 24.x, and v25.x. The affected product is Node.js, provided by the nodejs:node vendor.
Risk and Exploitability
The CVSS score of 7.5 classifies the issue as high severity, but the EPSS score of less than 1 percent indicates exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Attackers can trigger it remotely by sending a crafted HTTP request containing the __proto__ header, resulting in a crash that would disrupt service availability.
OpenCVE Enrichment
Debian DSA