CVE-2026-22036

Severity
7.5HIGH
EPSS
0.0%
top 94.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 14

Description

Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages4 packages

CVEListV5nodejs/undici< 6.23.0+1
NVDnodejs/undici7.0.07.18.2+1
Debiannode-undici< 7.18.2+dfsg+~cs3.2.0-1
npmundici7.0.07.18.2+1

Patches

🔴Vulnerability Details

4
OSV
Undici has an unbounded decompression chain in HTTP responses on Node.js Fetch API via Content-Encoding leads to resource exhaustion2026-01-14
OSV
CVE-2026-22036: Undici is an HTTP/12026-01-14
CVEList
Undici has an unbounded decompression chain in HTTP responses on Node.js Fetch API via Content-Encoding leads to resource exhaustion2026-01-14
GHSA
Undici has an unbounded decompression chain in HTTP responses on Node.js Fetch API via Content-Encoding leads to resource exhaustion2026-01-14

📋Vendor Advisories

2
Red Hat
undici: Undici: Denial of Service via excessive decompression steps2026-01-14
Debian
CVE-2026-22036: node-undici - Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-22036 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-22036 (HIGH CVSS 7.5) | Undici is an HTTP/1.1 client for No | cvebase.io