CVE-2026-7768
HIGH@fastify/accepts-serializer vulnerable to Denial of Service via Unbounded Accept Header Cache Growth
Title source: cnaDescription
@fastify/accepts-serializer cached serializer-selection results keyed by the request Accept header without a size limit or eviction policy. A remote unauthenticated client could send many distinct but matching Accept header variants to make the cache grow unbounded, eventually exhausting the Node.js heap and crashing the process. Versions <= 6.0.3 are affected. Update to 6.0.4 or later, which bounds the cache via an LRU with a default size of 100 entries, configurable through the new cacheSize plugin option.
References (2)
Core 2
Scores
CVSS v3
7.5
EPSS
0.0004
EPSS Percentile
11.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-770
Status
published
Products (2)
@fastify/accepts-serializer/@fastify/accepts-serializer
< 6.0.4
@fastify/accepts-serializer/@fastify/accepts-serializer
6.0.4
Published
May 04, 2026
Tracked Since
May 05, 2026