Skip to content

Commit 4cb897f

Browse files
1 parent 19f0e98 commit 4cb897f

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

advisories/github-reviewed/2026/01/GHSA-58q2-9x27-h2jm/GHSA-58q2-9x27-h2jm.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-58q2-9x27-h2jm",
4-
"modified": "2026-01-15T20:12:25Z",
4+
"modified": "2026-01-15T22:31:35Z",
55
"published": "2026-01-15T20:12:25Z",
66
"aliases": [],
77
"summary": "solspace/craft-freeform Has a DoS Vulnerability",
8-
"details": "### Summary\nFreeform plugin v4.1.29 uses vulnerable Axios ^1.7.7 allowing unauthenticated attackers to crash servers via malicious data: URIs causing memory exhaustion (CVE-2025-58754).\n\nFreeform version: 4.1.29\nCraft CMS version: 4.16.8\n\n### Impact\nWhen Axios runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`.",
8+
"details": "### Summary\nFreeform plugin v4.1.29 uses vulnerable Axios ^1.7.7 allowing unauthenticated attackers to crash servers via malicious data: URIs causing memory exhaustion (CVE-2025-58754).\n\nFreeform version: 4.1.29\nCraft CMS version: 4.16.8\n\n### Impact\nWhen Axios runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: 'stream'`.\n\nhttps://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj\nhttps://github.com/axios/axios/pull/7011\nhttps://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593\nhttps://github.com/axios/axios/releases/tag/v1.12.0",
99
"severity": [
1010
{
1111
"type": "CVSS_V4",
@@ -23,17 +23,17 @@
2323
"type": "ECOSYSTEM",
2424
"events": [
2525
{
26-
"introduced": "4.1.29"
26+
"introduced": "0"
2727
},
2828
{
2929
"fixed": "4.1.30"
3030
}
3131
]
3232
}
3333
],
34-
"versions": [
35-
"4.1.29"
36-
]
34+
"database_specific": {
35+
"last_known_affected_version_range": "< 4.1.29"
36+
}
3737
}
3838
],
3939
"references": [

0 commit comments

Comments
 (0)