Critical DoS Flaw in node-forge (CVE-2026-33891) Prompts Urgent Dependency Update
A high-severity Denial of Service (DoS) vulnerability has been disclosed in the widely-used `node-forge` cryptography library, forcing development teams to urgently patch dependencies. The flaw, tracked as CVE-2026-33891, resides in the `BigInteger.modInverse()` function inherited from the bundled jsbn library. When this function is called with a zero value as input, it triggers an infinite loop, causing the Node.js process to hang indefinitely and consume 100% CPU resources. This creates a straightforward vector for attackers to crash applications that rely on this library for cryptographic operations.
The vulnerability, rated HIGH severity, was reported by a researcher known as Kr0emer and has been addressed in node-forge version 1.4.0, released on March 24, 2026. The patch is a direct response to the security advisory (GHSA-...). The issue highlights a critical risk in a foundational component used for tasks like TLS/SSL, digital signatures, and certificate generation, making it a high-priority update for any project in the dependency chain.
For development and security teams, this is not a theoretical risk. Any service using a vulnerable version (1.3.0 or earlier) of node-forge is exposed to a trivial DoS attack. The immediate implication is mandatory dependency management: automated scans and manual updates are required to bump the version to 1.4.0. Failure to patch leaves microservices and applications—like the referenced `/microservices/adp_ui`—vulnerable to complete unavailability, underscoring the persistent operational security burden in modern software supply chains.