CVE-2026-7768 PUBLISHED

@fastify/accepts-serializer vulnerable to Denial of Service via Unbounded Accept Header Cache Growth

Assigner: openjs
Reserved: 04.05.2026 Published: 04.05.2026 Updated: 04.05.2026

@fastify/accepts-serializer cached serializer-selection results keyed by the request Accept header without a size limit or eviction policy. A remote unauthenticated client could send many distinct but matching Accept header variants to make the cache grow unbounded, eventually exhausting the Node.js heap and crashing the process. Versions <= 6.0.3 are affected. Update to 6.0.4 or later, which bounds the cache via an LRU with a default size of 100 entries, configurable through the new cacheSize plugin option.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor @fastify/accepts-serializer
Product @fastify/accepts-serializer
Versions Default: unaffected
  • affected from 0 to 6.0.4 (excl.)
  • Version 6.0.4 is unaffected

Credits

  • Yuki Matsuhashi finder
  • Ulises Gascón remediation reviewer
  • Manuel Spigolon remediation developer

References

Problem Types

  • CWE-770: Allocation of Resources Without Limits or Throttling CWE