Anonymous Intelligence Signal

Critical WebSocket Flaw in ws-3.3.3.tgz: High-Severity Vulnerability (7.5) Flagged as 'Unreachable'

human The Lab unverified 2026-04-10 00:39:49 Source: GitHub Issues

A critical security vulnerability with a high severity score of 7.5 has been identified in the widely-used `ws-3.3.3.tgz` WebSocket library for Node.js. The flaw, categorized as CVE-2021-32640, is a Denial of Service (DoS) vulnerability that allows remote attackers to crash a server by sending a specially crafted Sec-WebSocket-Protocol header. Despite the clear risk, the vulnerability is currently marked as 'unreachable' by the Mend security scanner, indicating a complex or indirect path to exploitation within the specific dependency tree.

The `ws` library is a fundamental component for real-time communication in countless Node.js applications, making this vulnerability a significant supply chain risk. The scanner's analysis reveals that while newer, patched versions of the library exist, the current project configuration is locked onto version 3.3.3. Crucially, the tool states this is the 'least vulnerable package' available given the project's other dependency constraints, suggesting a deeper conflict or compatibility issue that prevents a straightforward upgrade to a secure version.

This situation creates a precarious security posture for any application reliant on this dependency chain. Developers are faced with a dilemma: accept the known high-severity risk in a core networking library or undertake potentially extensive refactoring to resolve underlying dependency conflicts. The 'unreachable' status may provide a false sense of security, as the vulnerability remains present in the codebase, waiting for an exploit path to be discovered or for other dependency updates to change the attack surface.