CVE-2025-7339 Affecting node-on-headers package, versions <1.0.2-4


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-NODEONHEADERS-10822635
  • published19 Jul 2025
  • disclosed17 Jul 2025

Introduced: 17 Jul 2025

NewCVE-2025-7339  (opens in a new tab)

How to fix?

Upgrade Debian:13 node-on-headers to version 1.0.2-4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream node-on-headers package and not the node-on-headers package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

on-headers is a node.js middleware for listening to when a response writes headers. A bug in on-headers versions &lt;1.1.0 may result in response headers being inadvertently modified when an array is passed to response.writeHead(). Users should upgrade to version 1.1.0 to receive a patch. Uses are strongly encouraged to upgrade to 1.1.0, but this issue can be worked around by passing an object to response.writeHead() rather than an array.

CVSS Base Scores

version 3.1