PatchSiren

Node.js CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

MEDIUM Node.js CVE published 2026-03-30

CVE-2026-21717

CVE-2026-21717 describes a denial-of-service issue in Node.js related to V8 string hashing. Integer-like strings can be hashed to predictable numeric values, making collisions easy to create in V8’s internal string table and significantly degrading process performance, especially when attacker-controlled JSON is parsed.

MEDIUM Node.js CVE published 2026-03-30

CVE-2026-21713

CVE-2026-21713 describes a timing side-channel in Node.js HMAC verification. When user-provided signatures are validated with a non-constant-time comparison, an attacker with sufficiently precise timing measurements may be able to learn how many leading bytes match and use that as a timing oracle to infer HMAC values. The issue affects Node.js 20.x, 22.x, 24.x, and 25.x and is categorized by NVD as CWE-208.

MEDIUM Node.js CVE published 2026-03-30

CVE-2026-21712

CVE-2026-21712 is a denial-of-service issue in Node.js URL handling. According to the supplied description, calling url.format() with a malformed internationalized domain name (IDN) containing invalid characters can trigger an assertion failure in native code and crash the Node.js process. The issue was published on 2026-03-30 and later modified on 2026-05-10.