Description
seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0
and below, overriding encoded array lengths by replacing them with an excessively large value causes the deserialization process to significantly increase processing time. This issue has been fixed in version 1.4.1.
Published: 2026-01-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Immediately
AI Analysis

Impact

The Seroval library, used for JavaScript value stringification beyond JSON.stringify, contains a flaw in versions 1.4.0 and earlier. When a serialized array has an encoded length that is overridden with an excessively large value, the deserialization routine consumes disproportionately more time, allowing an attacker to exhaust server resources and cause a denial of service. This weakness is classified as a resource exhaustion vulnerability (CWE-770).

Affected Systems

Applications that incorporate the lxsmnsyc:seroval library, particularly Node.js projects that depend on Seroval version 1.4.0 or older, are vulnerable. The issue applies to any environment where serialized Seroval data is processed by the library.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity condition, while an EPSS score of less than 1 % signals a low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is inferred from the description; an attacker could supply a malicious payload during deserialization—either via an HTTP request, a file upload, or a messaging channel—to trigger the denial of service.

Generated by OpenCVE AI on April 18, 2026 at 04:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Seroval dependency to version 1.4.1 or later.
  • Restart or redeploy the application to load the patched library.
  • Implement input validation that limits the size of arrays before invoking deserialization to guard against oversized payloads.

Generated by OpenCVE AI on April 18, 2026 at 04:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-66fc-rw6m-c2q6 Seroval affected by Denial of Service via Array serialization
History

Mon, 06 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:lxsmnsyc:seroval:*:*:*:*:*:*:*:* cpe:2.3:a:lxsmnsyc:seroval:*:*:*:*:*:node.js:*:*

Fri, 27 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:lxsmnsyc:seroval:*:*:*:*:*:*:*:*

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Lxsmnsyc
Lxsmnsyc seroval
Vendors & Products Lxsmnsyc
Lxsmnsyc seroval

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 22 Jan 2026 02:00:00 +0000

Type Values Removed Values Added
Description seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, overriding encoded array lengths by replacing them with an excessively large value causes the deserialization process to significantly increase processing time. This issue has been fixed in version 1.4.1.
Title seroval is vulnerable to Denial of Service via array serialization
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Lxsmnsyc Seroval
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-22T18:56:49.004Z

Reserved: 2026-01-19T14:49:06.313Z

Link: CVE-2026-23957

cve-icon Vulnrichment

Updated: 2026-01-22T18:56:45.897Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T02:15:52.470

Modified: 2026-04-06T13:51:20.650

Link: CVE-2026-23957

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-22T01:26:53Z

Links: CVE-2026-23957 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:15:05Z

Weaknesses