CVE-2022-2596
Medium
|5.9Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to cause a denial of service by sending specially crafted input that makes the application slow down significantly. It affects versions of the node-fetch library before 3.2.10, so users running those versions are at risk if they process untrusted data.
Technical Description
Inefficient Regular Expression Complexity in GitHub repository node-fetch/node-fetch prior to 3.2.10.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$828($500-$1K)
Vendor Response
Grade FPatched in 1304 days
Quick Information
Published
Aug 1, 2022
over 3 years ago
Last Modified
Feb 25, 2026
about 1 month ago
Vendor
node-fetch project
Product
node-fetch