Improper Input Validation Affecting uwebsockets package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.33% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CONAN-UWEBSOCKETS-10078481
  • published8 May 2025
  • disclosed31 May 2018
  • creditUnknown

Introduced: 31 May 2018

CVE-2016-10544  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

There is no fixed version for uwebsockets.

Overview

Affected versions of this package are vulnerable to Improper Input Validation uws is a WebSocket server library. By sending a 256mb websocket message to a uws server instance with permessage-deflate enabled, there is a possibility used compression will shrink said 256mb down to less than 16mb of websocket payload which passes the length check of 16mb payload. This data will then inflate up to 256mb and crash the node process by exceeding V8's maximum string size. This affects uws >=0.10.0 <=0.10.8.

References

CVSS Base Scores

version 3.1