HTTP Client Vulnerability in Undici Affecting Node.js Applications
CVE-2025-22150

6.8MEDIUM

Key Information:

Vendor

Nodejs

Status
Vendor
CVE Published:
21 January 2025

What is CVE-2025-22150?

The Undici HTTP/1.1 client, prior to specified patched versions, utilizes Math.random() to designate boundaries for multipart/form-data requests. This method is inherently flawed, as outputs can be predicted if previous values are exposed. Consequently, should an application dispatch multipart requests to a malicious server, an attacker could manipulate the transmitted data, leading to potential exploits against backend APIs. Users are urged to upgrade to versions 5.28.5, 6.21.1, or 7.2.3, or to avoid sending multipart requests to untrusted servers to mitigate risks.

Affected Version(s)

undici >= 4.5.0, < 5.28.5 < 4.5.0, 5.28.5

undici >= 6.0.0, < 6.21.1 < 6.0.0, 6.21.1

undici >= 7.0.0, < 7.2.3 < 7.0.0, 7.2.3

References

CVSS V3.1

Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.