Vulnerability Description
[email protected] and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or toString, the parser invokes .push() on the inherited prototype value rather than an array, throwing a TypeError that propagates as an uncaught exception and crashes the process. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: none. Upgrade to [email protected] or higher.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pillarjs | Multiparty | < 4.3.0 |
Related Weaknesses (CWE)
References
- https://cna.openjsf.org/security-advisories.htmlThird Party Advisory
- https://github.com/pillarjs/multiparty/security/advisories/GHSA-qxch-whhj-8956Vendor Advisory
FAQ
What is CVE-2026-8161?
CVE-2026-8161 is a vulnerability with a CVSS score of 7.5 (HIGH). [email protected] and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.protot...
How severe is CVE-2026-8161?
CVE-2026-8161 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8161?
Check the references section above for vendor advisories and patch information. Affected products include: Pillarjs Multiparty.