CVE-2025-47935 – multer
Package
Manager: npm
Name: multer
Vulnerable Version: >=0 <2.0.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00018 pctl0.03078
Details
Multer vulnerable to Denial of Service via memory leaks from unclosed streams ### Impact Multer <2.0.0 is vulnerable to a resource exhaustion and memory leak issue due to improper stream handling. When the HTTP request stream emits an error, the internal `busboy` stream is not closed, violating Node.js stream safety guidance. This leads to unclosed streams accumulating over time, consuming memory and file descriptors. Under sustained or repeated failure conditions, this can result in denial of service, requiring manual server restarts to recover. All users of Multer handling file uploads are potentially impacted. ### Patches Users should upgrade to `2.0.0` ### Workarounds None ### References - https://github.com/expressjs/multer/pull/1120 - https://github.com/expressjs/multer/commit/2c8505f207d923dd8de13a9f93a4563e59933665
Metadata
Created: 2025-05-19T22:04:17Z
Modified: 2025-05-19T22:04:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-44fp-w29j-9vj5/GHSA-44fp-w29j-9vj5.json
CWE IDs: ["CWE-401"]
Alternative ID: GHSA-44fp-w29j-9vj5
Finding: F067
Auto approve: 1