Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vw5p-8cq8-m7mv | Devalue is vulnerable to denial of service due to memory exhaustion in devalue.parse |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Svelte
Svelte devalue |
|
| Vendors & Products |
Svelte
Svelte devalue |
Fri, 16 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 15 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 15 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 15 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.3.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. The root cause is the typed array hydration expecting an ArrayBuffer as input, but not checking the assumption before creating the typed array. This vulnerability is fixed in 5.6.2. | |
| Title | devalue vulnerable to denial of service due to memory exhaustion in devalue.parse | |
| Weaknesses | CWE-405 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-15T19:16:10.500Z
Reserved: 2026-01-09T18:27:19.387Z
Link: CVE-2026-22774
Updated: 2026-01-15T19:16:08.312Z
Status : Awaiting Analysis
Published: 2026-01-15T19:16:05.813
Modified: 2026-01-16T15:55:12.257
Link: CVE-2026-22774
OpenCVE Enrichment
Updated: 2026-01-16T13:43:07Z
Github GHSA