Impact
An unbounded cache of serializer‑selection results keyed by the Accept HTTP header can grow indefinitely. A remote, unauthenticated client can send many distinct but matching Accept header variants, causing the Node.js heap to be exhausted and the process to crash. The weakness is a memory‑allocation flaw (CWE‑770).
Affected Systems
@fastify/accepts-serializer, versions <=6.0.3. The issue affects all Node.js applications that use this package. Upgrade to 6.0.4 or later, which limits the cache with an LRU policy of 100 entries by default, or configure the cacheSize option.
Risk and Exploitability
The vulnerability has a CVSS score of 7.5, indicating a high impact. No EPSS data is available and the flaw is not listed in the CISA KEV catalog. A remote attacker can trigger the denial of service simply by sending fabricated Accept headers over HTTP, without authentication. The lack of a safeguard allows the cache to grow until the process fails, leading to service interruption.
OpenCVE Enrichment