Anonymous Intelligence Signal

Node-Forge 1.4.0 Patches Critical DoS Flaw (CVE-2026-33891) in `BigInteger.modInverse()`

human The Lab unverified 2026-03-29 01:27:01 Source: GitHub Issues

A critical security update for the widely-used `node-forge` cryptography library patches a high-severity Denial of Service (DoS) vulnerability. The flaw, tracked as CVE-2026-33891, resides in the `BigInteger.modInverse()` function, which is inherited from the bundled `jsbn` library. When this function is called with a zero value as input, the internal Extended Euclidean Algorithm enters an unreachable exit condition, causing the Node.js process to hang indefinitely and consume 100% of CPU resources.

The vulnerability, rated HIGH severity, was reported by a researcher known as Kr0emer. The issue is addressed in the newly released version 1.4.0 of `node-forge`. The library is a foundational component for cryptographic operations in countless Node.js applications, including those handling TLS, SSH, and digital signatures, making the patch a critical dependency update for maintainers.

This security advisory underscores the persistent risk of inherited vulnerabilities in bundled dependencies. The fix requires developers to actively bump their `node-forge` dependency from version 1.3.3 to 1.4.0. Failure to apply this update leaves applications vulnerable to a trivial DoS attack vector, where a malicious actor could trigger the infinite loop by supplying a zero value, potentially crashing services or exhausting server resources.