Improper Input Validation
CVE-2025-15284
Summary
Improper Input Validation vulnerability in qs (parse modules) versions prior to 6.14.1 allows HTTP Denial-of-Service (DoS). The "arrayLimit" option in qs does not enforce limits for bracket notation (a[]=1&a[]=2), allowing attackers to cause Denial-of-Service (DoS) via memory exhaustion. Applications using "arrayLimit" for DoS protection are vulnerable.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-20 - Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
References
Advisory Timeline
- Published