Skip to main content

Improper Input Validation in org.webjars.npm:qs

CVE-2025-15284

  • org.webjars.npm:qs
  • qs
Severity Medium
Score 6.3/10

Summary

Improper Input Validation vulnerability in qs (parse modules) versions prior to 6.14.1 allows HTTP Denial-of-Service (DoS). The "arrayLimit" option in qs does not enforce limits for bracket notation (a[]=1&a[]=2), allowing attackers to cause Denial-of-Service (DoS) via memory exhaustion. Applications using "arrayLimit" for DoS protection are vulnerable.

  • HIGH
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • LOW

CWE-20 - Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Advisory Timeline

  • Published