CVE-2026-21710 Affecting nodejs22-debuginfo package, versions <1:22.22.2-1.el10_1


Severity

Recommended
high

Based on Rocky Linux security rating.

Threat Intelligence

EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ROCKY10-NODEJS22DEBUGINFO-16053703
  • published15 Apr 2026
  • disclosed30 Mar 2026

Introduced: 30 Mar 2026

NewCVE-2026-21710  (opens in a new tab)

How to fix?

Upgrade Rocky-Linux:10 nodejs22-debuginfo to version 1:22.22.2-1.el10_1 or higher.
This issue was patched in RLSA-2026:7080.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nodejs22-debuginfo package and not the nodejs22-debuginfo package as distributed by Rocky-Linux. See How to fix? for Rocky-Linux:10 relevant fixed versions and status.

A flaw in Node.js HTTP request handling causes an uncaught TypeError when a request is received with a header named __proto__ and the application accesses req.headersDistinct.

When this occurs, dest[&#34;__proto__&#34;] resolves to Object.prototype rather than undefined, causing .push() to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be intercepted by error event listeners, meaning it cannot be handled without wrapping every req.headersDistinct access in a try/catch.

  • This vulnerability affects all Node.js HTTP servers on 20.x, 22.x, 24.x, and v25.x

CVSS Base Scores

version 3.1