multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser invokes decodeURI on the value without try/catch. The resulting URIError propagates as an uncaught exception and crashes the process. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: none. Upgrade to multiparty@4.3.0 or higher.

Project Subscriptions

Vendors Products
Multiparty Subscribe
Multiparty Subscribe
Pillarjs Subscribe
Multiparty Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 13 May 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Pillarjs
Pillarjs multiparty
CPEs cpe:2.3:a:pillarjs:multiparty:*:*:*:*:*:node.js:*:*
Vendors & Products Pillarjs
Pillarjs multiparty

Wed, 13 May 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Multiparty
Multiparty multiparty
Vendors & Products Multiparty
Multiparty multiparty

Tue, 12 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser invokes decodeURI on the value without try/catch. The resulting URIError propagates as an uncaught exception and crashes the process. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: none. Upgrade to multiparty@4.3.0 or higher.
Title multiparty vulnerable to Denial of Service via Uncaught Exception in filename* parameter parsing
Weaknesses CWE-755
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: openjs

Published:

Updated: 2026-05-12T12:33:12.647Z

Reserved: 2026-05-08T11:05:42.781Z

Link: CVE-2026-8162

cve-icon Vulnrichment

Updated: 2026-05-12T12:33:08.706Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-12T10:16:49.110

Modified: 2026-05-13T14:43:47.950

Link: CVE-2026-8162

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T10:39:13Z

Weaknesses