Description
flatted is a circular JSON parser. Prior to 3.4.0, flatted's parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process. This vulnerability is fixed in 3.4.0.
Published: 2026-03-12
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability is an unbounded recursive revive() phase in flatted's parse() function that can cause a stack overflow when parsing JSON objects with deeply nested or self-referential $ indices. The stack overflow crashes the Node.js process, leading to a denial of service. This issue is related to CWE-674 (Uncontrolled Recursion) and CWE-770 (Out-of-Memory Errors).

Affected Systems

WebReflection's flatted package is affected. Any installation using a version older than 3.4.0 is vulnerable. The vulnerability was fixed in flatted 3.4.0. Vendors using node.js environments that rely on flatted in any part of the code base fall into the impact zone.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is the delivery of a crafted JSON payload to the parse() function, typically from untrusted input. If the application parses data from external sources without validation, an attacker could trigger the stack overflow and cause a denial of service. The exploit does not require privileged access and can be performed remotely by submitting such payload to the vulnerable function.

Generated by OpenCVE AI on March 19, 2026 at 22:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade flatted to version 3.4.0 or later.
  • Avoid parsing untrusted or deeply nested JSON data until the update is applied.
  • Monitor application logs for unexpected crashes or stack overflows.

Generated by OpenCVE AI on March 19, 2026 at 22:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-25h7-pfq9-p65f flatted vulnerable to unbounded recursion DoS in parse() revive phase
History

Thu, 19 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:webreflection:flatted:*:*:*:*:*:node.js:*:*

Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
References
Metrics threat_severity

None

threat_severity

Important


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Webreflection
Webreflection flatted
Vendors & Products Webreflection
Webreflection flatted

Thu, 12 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description flatted is a circular JSON parser. Prior to 3.4.0, flatted's parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process. This vulnerability is fixed in 3.4.0.
Title flatted: Unbounded recursion DoS in parse() revive phase
Weaknesses CWE-674
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Webreflection Flatted
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T16:20:19.201Z

Reserved: 2026-03-10T22:19:36.546Z

Link: CVE-2026-32141

cve-icon Vulnrichment

Updated: 2026-03-13T16:20:10.284Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T18:16:25.837

Modified: 2026-03-19T21:07:24.717

Link: CVE-2026-32141

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-12T18:08:09Z

Links: CVE-2026-32141 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:48:38Z

Weaknesses