chore(deps): update dependency multiparty to v4.3.0 [security]#8265
Open
renovate[bot] wants to merge 1 commit into
Open
chore(deps): update dependency multiparty to v4.3.0 [security]#8265renovate[bot] wants to merge 1 commit into
renovate[bot] wants to merge 1 commit into
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.2.3→4.3.0multiparty: Denial of Service via Prototype Pollution leads to Uncaught Exception
CVE-2026-8161 / GHSA-qxch-whhj-8956
More information
Details
Impact
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a
multipart/form-datarequest with a field name that collides with an inheritedObject.prototypeproperty (e.g.,__proto__,constructor,toString), the parser invokes.push()on the inherited prototype value rather than an array, throwing aTypeErrorthat propagates as an uncaught exception and crashes the process. Any service accepting multipart uploads via multiparty is affected.Patches
Users should upgrade to multiparty@4.3.0 or higher.
Workarounds
None.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
multiparty vulnerable to Denial of Service via Uncaught Exception in filename* parameter parsing
CVE-2026-8162 / GHSA-xh3c-6gcq-g4rv
More information
Details
Impact
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a
multipart/form-datarequest with aContent-Disposition: filename*=utf-8''header containing a malformed percent-encoding (e.g.,%FF,%GG), the parser invokesdecodeURIon the value without try/catch. The resultingURIErrorpropagates as an uncaught exception and crashes the process. Any service accepting multipart uploads via multiparty is affected.Patches
Users should upgrade to multiparty@4.3.0 or higher.
Workarounds
None.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
multiparty vulnerable to ReDoS via filename parsing
CVE-2026-8159 / GHSA-65x3-rw7q-gx94
More information
Details
Impact
multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the
Content-Dispositionfilename parameter parser. A multipart upload with a long header value containing!filename="1repeated can cause regex matching to take seconds, blocking the event loop. Any service accepting multipart uploads via multiparty is affected.Patches
Users should upgrade to multiparty@4.3.0 or higher.
Workarounds
None. Limiting upload sizes at the proxy/gateway layer reduces but does not eliminate the attack surface, since a small ~8 KB header is sufficient to trigger the vulnerable backtracking.
Resources
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
pillarjs/multiparty (multiparty)
v4.3.0Compare Source
Important: Security
Fixed
a786412cb2421fConfiguration
📅 Schedule: (UTC)
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.