fdm-monster icon indicating copy to clipboard operation
fdm-monster copied to clipboard

CVE-2025-48997 (High) detected in multer-1.4.4-lts.1.tgz

Open mend-bolt-for-github[bot] opened this issue 10 months ago • 0 comments

CVE-2025-48997 - High Severity Vulnerability

Vulnerable Library - multer-1.4.4-lts.1.tgz

Middleware for handling `multipart/form-data`.

Library home page: https://registry.npmjs.org/multer/-/multer-1.4.4-lts.1.tgz

Path to dependency file: /server-nest/package.json

Path to vulnerable library: /server-nest/node_modules/multer/package.json

Dependency Hierarchy:

  • platform-express-9.1.6.tgz (Root Library)
    • :x: multer-1.4.4-lts.1.tgz (Vulnerable Library)

Found in HEAD commit: c3a675351b79a3823e2d069d654a3becc5f42dd0

Found in base branch: develop

Vulnerability Details

Multer is a node.js middleware for handling "multipart/form-data". A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.1 allows an attacker to trigger a Denial of Service (DoS) by sending an upload file request with an empty string field name. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to "2.0.1" to receive a patch. No known workarounds are available.

Publish Date: 2025-06-03

URL: CVE-2025-48997

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/expressjs/multer/security/advisories/GHSA-g5hg-p3ph-g8qg

Release Date: 2025-06-03

Fix Resolution (multer): 2.0.1

Direct dependency fix Resolution (@nestjs/platform-express): 10.4.19


Step up your Open Source Security Game with Mend here