Nest.js DoS via Malformed JSON: CVE-2026-40879
The National Vulnerability Database has detailed CVE-2026-40879, a high-severity denial-of-service vulnerability affecting Nest.js, a popular Node.js framework. Prior to version 11.1.19, an attacker can trigger a call stack overflow by sending numerous small, valid JSON messages within a single TCP frame. The handleData() function’s recursive processing, shrinking the buffer with each call, bypasses maxBufferSize limits, leading to a RangeError.
A payload of approximately 47 KB is sufficient to exploit this flaw. The CVSSv3.1 score of 7.5 (High) reflects the complete availability impact (A:H) with no user interaction or privileges required (AV:N/AC:L/PR:N/UI:N). This is a straightforward remote DoS, making it a low-effort, high-impact attack for unpatched systems.
This vulnerability, categorized under CWE-674 (Uncontrolled Recursion), highlights a common pitfall in network application development: inadequate input validation combined with recursive processing. For defenders, this means a direct path to service disruption if your Nest.js applications are not updated. Attackers will prioritize targets with public-facing Nest.js endpoints, as the exploit is simple and effective.
What This Means For You
- If your organization uses Nest.js for server-side applications, you are directly exposed to a remote denial-of-service attack via CVE-2026-40879. Patch immediately to version 11.1.19 or later. Audit your network perimeters for public-facing Nest.js instances and ensure they are updated to prevent service disruption.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 6 SIEM formats6 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Web Application Exploitation Attempt — CVE-2026-40879
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40879 | Vulnerability | CVE-2026-40879 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 21, 2026 at 23:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.