CVE-2026-22036
ADVISORY - githubSummary
Impact
The fetch() API supports chained HTTP encoding algorithms for response content according to RFC 9110 (e.g., Content-Encoding: gzip, br). This is also supported by the undici decompress interceptor.
However, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation.
Patches
Upgrade to 7.18.2 or 6.23.0.
Workarounds
It is possible to apply an undici interceptor and filter long Content-Encoding sequences manually.
References
Common Weakness Enumeration (CWE)
Allocation of Resources Without Limits or Throttling
Allocation of Resources Without Limits or Throttling
NIST
2.2
CVSS SCORE
5.9mediumGitHub
2.2
CVSS SCORE
5.9mediumDebian
-
Ubuntu
3.9
CVSS SCORE
7.5mediumAmazon
-
CVSS SCORE
N/AhighChainguard
CGA-v3cm-92h7-q9pf
-
minimos
MINI-2m8j-f36q-pwq6
-
minimos
MINI-3q7w-78xq-pjfq
-
minimos
MINI-73qc-ffhh-2w8g
-
minimos
MINI-86rq-wv6r-pmrx
-
minimos
MINI-hqw4-gm22-xmcf
-
minimos
MINI-jv7g-7xmr-m54h
-
minimos
MINI-mvjc-95pc-gp5p
-