Impact
A flaw in Node.js URL processing causes an assertion failure in native code when url.format() is called with a malformed internationalized domain name that contains invalid characters. This assertion failure crashes the Node.js process, resulting in a denial of service. The vulnerability stems from a logic error in IDN handling (CWE‑168) and does not provide code execution or privilege escalation.
Affected Systems
The flaw affects the Node.js runtime (nodejs:node) in every version that has not applied the March 2026 security release. All installations that rely on url.format() and accept external input including internationalized domain names are vulnerable if they are still running a pre‑March 2026 build.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity. The EPSS score of less than 1 % suggests a low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. An attacker can trigger the crash by supplying a crafted IDN to a vulnerable application, which may be possible remotely if the application accepts user‑supplied URLs. No public exploit has been disclosed, but the impact of a process crash can be significant in high‑availability or single‑process services.
OpenCVE Enrichment