Vulnerability Description
Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.3.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. The root cause is the typed array hydration expecting an ArrayBuffer as input, but not checking the assumption before creating the typed array. This vulnerability is fixed in 5.6.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Svelte | Devalue | >= 5.3.0, < 5.6.2 |
Related Weaknesses (CWE)
References
- https://github.com/sveltejs/devalue/commit/e46afa64dd2b25aa35fb905ba5d20cea63aabPatch
- https://github.com/sveltejs/devalue/releases/tag/v5.6.2Release Notes
- https://github.com/sveltejs/devalue/security/advisories/GHSA-vw5p-8cq8-m7mvVendor Advisory
FAQ
What is CVE-2026-22774?
CVE-2026-22774 is a vulnerability with a CVSS score of 7.5 (HIGH). Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.3.0 to 5.6.1, certain inputs can cause devalue.parse to consume exce...
How severe is CVE-2026-22774?
CVE-2026-22774 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-22774?
Check the references section above for vendor advisories and patch information. Affected products include: Svelte Devalue.