Description
Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.1.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. The root cause is the ArrayBuffer hydration expecting base64 encoded strings as input, but not checking the assumption before decoding the input. This vulnerability is fixed in 5.6.2.
Published: 2026-01-15
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Update Library
AI Analysis

Impact

devalue is a serializer that converts JavaScript values to strings. The vulnerability lies in the devalue.parse function, which can consume excessive CPU time and memory when parsing certain inputs. This excessive resource usage can lead to a denial‑of‑service condition for applications that rely on devalue.parse to process potentially untrusted data.

Affected Systems

The affected product is the Svelte devalue library, version range 5.1.0 through 5.6.1. Applications built with any of those releases that invoke devalue.parse on data coming from external sources are vulnerable. The issue is fixed in devalue 5.6.2; the library runs on Node.js environments as indicated by the CPE.

Risk and Exploitability

The CVSS base score of 7.5 indicates a high severity. EPSS is less than 1%, suggesting a low likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is feeding crafted input to devalue.parse, typically via an API, web form, or any untrusted data channel. Successful exploitation would consume server CPU or memory until the process becomes unresponsive, resulting in a denial of service.

Generated by OpenCVE AI on April 18, 2026 at 16:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade devalue to v5.6.2 or newer, which contains the patch for this issue.
  • Remove or guard any calls to devalue.parse that handle untrusted input; replace them with safer parsing or validate the data beforehand.
  • Enforce input size limits or perform sanitization before passing data to devalue.parse to mitigate potential resource consumption.

Generated by OpenCVE AI on April 18, 2026 at 16:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g2pg-6438-jwpf devalue vulnerable to denial of service due to memory/CPU exhaustion in devalue.parse
History

Tue, 20 Jan 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:svelte:devalue:*:*:*:*:*:node.js:*:*

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Svelte
Svelte devalue
Vendors & Products Svelte
Svelte devalue

Fri, 16 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 15 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.1.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. The root cause is the ArrayBuffer hydration expecting base64 encoded strings as input, but not checking the assumption before decoding the input. This vulnerability is fixed in 5.6.2.
Title devalue vulnerable to denial of service due to memory/CPU exhaustion in devalue.parse
Weaknesses CWE-405
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-15T19:22:56.774Z

Reserved: 2026-01-09T18:27:19.387Z

Link: CVE-2026-22775

cve-icon Vulnrichment

Updated: 2026-01-15T19:22:54.448Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-15T19:16:05.963

Modified: 2026-01-20T15:29:35.663

Link: CVE-2026-22775

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-15T18:59:37Z

Links: CVE-2026-22775 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:15:04Z

Weaknesses