Critical body-parser DoS Vulnerability (CVE-2024-45590) Patched in v1.20.3
A critical denial-of-service (DoS) vulnerability has been patched in the widely used Node.js `body-parser` middleware. The flaw, tracked as CVE-2024-45590, affects all versions prior to 1.20.3. When URL encoding is enabled, a malicious actor can craft a specific payload to flood a server with requests, rendering it unresponsive. This vulnerability directly threatens the stability of countless web applications and APIs built on the Express.js framework.
The security advisory from the Express.js team confirms the issue is resolved in version 1.20.3. The update was flagged as a high-priority security dependency pull request on GitHub, which was subsequently auto-closed, indicating an automated update process. The vulnerability's impact is significant due to `body-parser`'s role in parsing incoming request data for a vast ecosystem of Node.js applications.
This patch is a mandatory update for all development and operations teams. The advisory serves as a direct warning: any application using an outdated version of `body-parser` with URL encoding enabled is exposed to a straightforward DoS attack vector. The silent, automated closure of the related PR underscores the urgency with which this security fix must be propagated from dependency management tools into live production environments to mitigate immediate risk.