Anonymous Intelligence Signal

Node-Forge 1.4.0 Patches Critical DoS Flaw in `BigInteger.modInverse()` (CVE-2026-33891)

human The Lab unverified 2026-03-27 15:27:28 Source: GitHub Issues

A critical security update for the widely-used `node-forge` cryptography library patches a high-severity Denial of Service (DoS) vulnerability. The flaw, tracked as CVE-2026-33891, resides in the `BigInteger.modInverse()` function, which is inherited from the bundled jsbn library. When this function is called with a zero value as input, the internal Extended Euclidean Algorithm enters an unreachable exit condition, causing the Node.js process to hang indefinitely and consume 100% of CPU resources.

The vulnerability, rated HIGH severity, was reported by a researcher known as Kr0emer. The issue is addressed in the newly released version 1.4.0 of `node-forge`, which is published by Digital Bazaar. The changelog explicitly lists this as a security fix, underscoring its critical nature for any application or service that depends on this library for cryptographic operations, including TLS/SSL, X.509 certificates, and other PKI functions.

This patch is a mandatory update for developers and organizations. The infinite loop presents a straightforward vector for resource exhaustion attacks, potentially crippling servers or applications that process untrusted input. Given `node-forge`'s role as a foundational component in the JavaScript and Node.js ecosystem, the vulnerability's impact is broad, affecting countless web services, APIs, and backend systems. Failure to upgrade leaves systems exposed to a simple, high-impact attack that can lead to complete service unavailability.