body-parser is vulnerable to denial of service when url encoding is used
Moderate severity
GitHub Reviewed
Published
Nov 24, 2025
in
expressjs/body-parser
•
Updated Nov 25, 2025
Description
Published by the National Vulnerability Database
Nov 24, 2025
Published to the GitHub Advisory Database
Nov 25, 2025
Reviewed
Nov 25, 2025
Last updated
Nov 25, 2025
Impact
body-parser 2.2.0 is vulnerable to denial of service due to inefficient handling of URL-encoded bodies with very large numbers of parameters. An attacker can send payloads containing thousands of parameters within the default 100KB request size limit, causing elevated CPU and memory usage. This can lead to service slowdown or partial outages under sustained malicious traffic.
Patches
This issue is addressed in version 2.2.1.
References