Impact
V8's string hashing mechanism treats integer-like strings as their numeric values, creating easily predictable hash collisions. An attacker can craft many such strings—most commonly by sending JSON that is parsed by JSON.parse—to flood the internal string hash table, severely degrading Node.js process performance and potentially causing a denial of service. The flaw is a hash collision vulnerability (CWE-328) that leads to CPU exhaustion rather than code execution.
Affected Systems
The vulnerability affects Node.js versions 20.x, 22.x, 24.x, and 25.x distributed by nodejs:node.
Risk and Exploitability
The CVSS score of 5.9 indicates moderate severity. EPSS is below 1%, suggesting the likelihood of exploitation is currently low, and the vulnerability is not listed in CISA's KEV catalog. The attack vector is inferred to be remote, requiring the attacker to send crafted input to an endpoint that processes JSON; most JSON parsing endpoints are exposed over the network, making the condition reasonably achievable if such endpoints exist on the system.
OpenCVE Enrichment
Debian DSA