Description
Nuxt OG Image generates OG Images with Vue templates in Nuxt. Prior to version 6.2.5, the image‑generation component by the URI: /_og/d/ (and, in older versions, /og-image/) contains a Denial of Service (DoS) vulnerability. The issue arises because there is no restriction on the width and height parameters of the generated image. The vulnerability was reproduced using the standard configuration and the default templates. This issue has been patched in version 6.2.5.
Published: 2026-03-31
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability in the Nuxt OG Image module allows an attacker to trigger a denial of service by requesting images with arbitrarily large width and height values. Because the image‑generation component at "/_og/d/" (and older "/og-image/" paths) imposes no limits on these parameters, an attacker can force the server to allocate excessive memory or CPU resources to render the requested image. This leads to resource exhaustion, potentially causing the entire application to become unresponsive. The weakness is identified as CWE‑400 and rated with a CVSS score of 6.9.

Affected Systems

This defect applies to all deployments of the nuxt-modules:og-image package before version 6.2.5. Users running any earlier released versions that expose the "/_og/d/" endpoint or the legacy "/og-image/" route are vulnerable. Updating the module to 6.2.5 or later patches the issue.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium‑to‑high severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Although the official documentation does not detail the attack vector, it is inferred that an unauthenticated user can exploit the flaw by constructively manipulating the width and height URL parameters on the vulnerable endpoint. Successful exploitation requires network access to the application and results in service degradation without compromising data confidentiality or integrity.

Generated by OpenCVE AI on April 1, 2026 at 06:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the nuxt-modules og-image package to version 6.2.5 or later.
  • If an upgrade is not immediately possible, limit the width and height parameters or disable the "/_og/d/" and legacy "/og-image/" endpoints.
  • Implement traffic monitoring and rate limiting on the image generation route to mitigate the impact of potential abuse.

Generated by OpenCVE AI on April 1, 2026 at 06:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c7xp-q6q8-hg76 Nuxt OG Image is vulnerable to Denial of Service via unbounded image dimensions
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Nuxt-modules
Nuxt-modules og-image
Vendors & Products Nuxt-modules
Nuxt-modules og-image

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description Nuxt OG Image generates OG Images with Vue templates in Nuxt. Prior to version 6.2.5, the image‑generation component by the URI: /_og/d/ (and, in older versions, /og-image/) contains a Denial of Service (DoS) vulnerability. The issue arises because there is no restriction on the width and height parameters of the generated image. The vulnerability was reproduced using the standard configuration and the default templates. This issue has been patched in version 6.2.5.
Title Nuxt OG Image vulnerable to DoS via image generation
Weaknesses CWE-400
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Nuxt-modules Og-image
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T13:37:28.025Z

Reserved: 2026-03-27T13:45:29.620Z

Link: CVE-2026-34404

cve-icon Vulnrichment

Updated: 2026-04-01T13:37:17.140Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-31T22:16:18.663

Modified: 2026-04-01T14:23:37.727

Link: CVE-2026-34404

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:10:29Z

Weaknesses