CRLF Injection Affecting sse-channel package, versions <4.0.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about CRLF Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-SSECHANNEL-16624719
  • published10 May 2026
  • disclosed5 May 2026
  • creditSnailSploit

Introduced: 5 May 2026

NewCVE-2026-44217  (opens in a new tab)
CWE-93  (opens in a new tab)

How to fix?

Upgrade sse-channel to version 4.0.1 or higher.

Overview

sse-channel is a Server-Sent Events "channel" where all messages are broadcasted to all connected clients, history is maintained automatically and server attempts to keep clients alive by sending "keep-alive" packets automatically.

Affected versions of this package are vulnerable to CRLF Injection via unsanitized event, retry, or id fields. An attacker can inject arbitrary messages into the SSE stream by supplying specially crafted input, potentially causing event spoofing, client-side manipulation, and data integrity issues.

Workaround

This vulnerability can be mitigated by sanitizing user input before passing it to the relevant fields, specifically by stripping any newlines.

CVSS Base Scores

version 4.0
version 3.1