PatchSiren cyber security CVE debrief
CVE-2015-8855 Nodejs CVE debrief
CVE-2015-8855 is a denial-of-service issue in the semver package used in the Node.js ecosystem. A specially long version string can trigger excessive CPU consumption through regular expression backtracking, making the application slow or unresponsive. The issue is rated HIGH and is not listed in CISA KEV in the supplied data.
- Vendor
- Nodejs
- Product
- CVE-2015-8855
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-23
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-23
- Advisory updated
- 2026-05-13
Who should care
Owners and maintainers of Node.js applications that depend on semver, especially if version strings are accepted from untrusted input. Security teams, SREs, and dependency managers should also review direct and transitive use of the affected package.
Technical summary
NVD describes the flaw as a regular expression denial of service (ReDoS) in semver versions before 4.3.2. The impact is availability-only: no confidentiality or integrity impact is recorded, but crafted long version strings can consume CPU and degrade service. The NVD CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, which matches a remotely triggerable availability problem.
Defensive priority
High
Recommended defensive actions
- Upgrade semver to 4.3.2 or later wherever it is directly or transitively used.
- Audit Node.js applications and build pipelines for semver dependencies and lockfile pinning.
- Test any inputs that pass version strings into semver parsing or comparison paths, and reject unexpectedly long or malformed values.
- Monitor for abnormal CPU spikes or request latency in services that process version strings.
- If immediate upgrading is not possible, reduce exposure by limiting untrusted access to version-parsing endpoints and constraining input size.
Evidence notes
Primary source text states that semver before 4.3.2 for Node.js allows attackers to cause denial of service via a long version string, described as a ReDoS. NVD assigns CVSS 3.0 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H and lists CWE-399. The supplied references include an Openwall oss-security mailing list post, a SecurityFocus VDB entry, and a NodeSecurity advisory. The NVD CPE mapping in the corpus is broader than the package-level description, so the semver version statement should be treated as the most specific affected-version guidance.
Official resources
-
CVE-2015-8855 CVE record
CVE.org
-
CVE-2015-8855 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Patch, Vendor Advisory
Publicly disclosed and recorded in NVD on 2017-01-23T21:59:00.503Z; the supplied NVD record was last modified on 2026-05-13T00:24:29.033Z. No KEV entry is present in the supplied enrichment.