CVE-2026-35515

MEDIUM

@nestjs/core Improperly Neutralizes Special Elements in Output Used by a Downstream Component ('Injection')

Title source: cna
STIX 2.1

Description

Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.18, SseStream._transform() interpolates message.type and message.id directly into Server-Sent Events text protocol output without sanitizing newline characters (\r, \n). Since the SSE protocol treats both \r and \n as field delimiters and \n\n as event boundaries, an attacker who can influence these fields through upstream data sources can inject arbitrary SSE events, spoof event types, and corrupt reconnection state. This vulnerability is fixed in 11.1.18.

Scores

CVSS v3 6.1
EPSS 0.0001
EPSS Percentile 1.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-74
Status published
Products (2)
nestjs/core 0 - 11.1.18npm
nestjs/nest < 11.1.18 (2 CPE variants)
Published Apr 07, 2026
Tracked Since Apr 07, 2026