CVE-2026-34043 — Uncontrolled Resource Consumption in Serialize-javascript
Severity
7.5HIGHNVD
EPSS
0.1%
top 83.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 31
Latest updateApr 1
Description
Serialize JavaScript to a superset of JSON that includes regular expressions and functions. Prior to version 7.0.5, there is a Denial of Service (DoS) vulnerability caused by CPU exhaustion. When serializing a specially crafted "array-like" object (an object that inherits from Array.prototype but has a very large length property), the process enters an intensive loop that consumes 100% CPU and hangs indefinitely. This issue has been patched in version 7.0.5.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages4 packages
Patches
🔴Vulnerability Details
3OSV▶
CVE-2026-34043: Serialize JavaScript to a superset of JSON that includes regular expressions and functions↗2026-03-31
GHSA
▶
OSV
▶
📋Vendor Advisories
2🕵️Threat Intelligence
31💬Community
6Bugzilla▶
CVE-2026-34043 cachelib: serialize-javascript: Denial of Service via specially crafted array-like object serialization [fedora-all]↗2026-04-01
Bugzilla▶
CVE-2026-34043 openbao: serialize-javascript: Denial of Service via specially crafted array-like object serialization [fedora-all]↗2026-04-01
Bugzilla▶
CVE-2026-34043 openbao: serialize-javascript: Denial of Service via specially crafted array-like object serialization [epel-all]↗2026-04-01
Bugzilla▶
CVE-2026-34043 fbthrift: serialize-javascript: Denial of Service via specially crafted array-like object serialization [epel-all]↗2026-04-01
Bugzilla▶
CVE-2026-34043 cachelib: serialize-javascript: Denial of Service via specially crafted array-like object serialization [epel-all]↗2026-04-01