Node.js FTP Clients Exposed to DoS via Malicious Listings

Node.js FTP Clients Exposed to DoS via Malicious Listings

The National Vulnerability Database (NVD) has disclosed CVE-2026-41324, a high-severity denial-of-service vulnerability affecting basic-ftp, a popular Node.js FTP client. Versions prior to 5.3.0 are susceptible to unbounded memory growth when processing directory listings from a remote FTP server. This isn’t just a theoretical flaw; a compromised or malicious server can exploit this by sending an excessively large or never-ending directory listing, forcing the client process to consume all available memory until it crashes or becomes unstable.

This vulnerability, with a CVSS score of 7.5 (HIGH), highlights a critical risk for any application relying on basic-ftp for client-side FTP operations. The attacker’s calculus is straightforward: disrupt operations with minimal effort. They don’t need to breach your perimeter; they just need to control the FTP server your client connects to, or compromise the network path to it. This can lead to significant operational downtime and resource exhaustion, impacting service availability and potentially cascading into broader system instability.

Defenders need to prioritize this. If your applications use basic-ftp, immediate action is required. The fix is available in version 5.3.0. This isn’t a ‘wait and see’ situation; it’s a direct path to service disruption if an external FTP endpoint is compromised or malicious. Patching is non-negotiable here.

What This Means For You

  • If your Node.js applications utilize the `basic-ftp` library, you must immediately verify its version. Upgrade to version 5.3.0 or later to mitigate CVE-2026-41324 and prevent potential denial-of-service attacks against your client processes.
🛡️ Am I exposed to this? Get detection rules for CVE-2026-41324 — Splunk, Sentinel, Elastic, QRadar & more

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1499 Impact

Node.js basic-ftp Client DoS via Malicious Listing - CVE-2026-41324

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-41324 DoS basic-ftp Node.js FTP client versions < 5.3.0
CVE-2026-41324 DoS Unbounded memory growth in Client.list() when processing directory listings
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 24, 2026 at 07:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6810 — The Booking Calendar Contact Form plugin for WordPress is

CVE-2026-6810 — The Booking Calendar Contact Form plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.2.63...

vulnerabilityCVEmedium-severitycwe-639
/SCW Vulnerability Desk /MEDIUM /5.3 /⚑ 2 IOCs /⚙ 6 Sigma

CVE-2026-5428 — Cross-Site Scripting (XSS)

CVE-2026-5428 — The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image captions in the Image Grid/Slider/Carousel widget in versions...

vulnerabilityCVEmedium-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /MEDIUM /6.4 /⚑ 2 IOCs /⚙ 2 Sigma

WordPress Plugin Flaw Exposes Sites to RCE

CVE-2026-5364 — The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to,...

vulnerabilityCVEhigh-severityremote-code-executioncwe-434
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 3 IOCs /⚙ 3 Sigma