CVE-2026-21710 Affecting nodejs-packaging-bundler package, versions <0:2021.06-6.module+el9.7.0+40165+d075e3f2


Severity

Recommended
high

Based on Rocky Linux security rating.

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ROCKY9-NODEJSPACKAGINGBUNDLER-15995589
  • published12 Apr 2026
  • disclosed30 Mar 2026

Introduced: 30 Mar 2026

CVE-2026-21710  (opens in a new tab)

How to fix?

Upgrade Rocky-Linux:9 nodejs-packaging-bundler to version 0:2021.06-6.module+el9.7.0+40165+d075e3f2 or higher.
This issue was patched in RLSA-2026:7896.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nodejs-packaging-bundler package and not the nodejs-packaging-bundler package as distributed by Rocky-Linux. See How to fix? for Rocky-Linux:9 relevant fixed versions and status.

A flaw in Node.js HTTP request handling causes an uncaught TypeError when a request is received with a header named __proto__ and the application accesses req.headersDistinct.

When this occurs, dest[&#34;__proto__&#34;] resolves to Object.prototype rather than undefined, causing .push() to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be intercepted by error event listeners, meaning it cannot be handled without wrapping every req.headersDistinct access in a try/catch.

  • This vulnerability affects all Node.js HTTP servers on 20.x, 22.x, 24.x, and v25.x

CVSS Base Scores

version 3.1