Vulnerabilities/

jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch

Severity:
Low

Description

Attempting to parse a patch whose filename headers contain the line break characters \r, \u2028, or \u2029 can cause the parsePatch method to enter an infinite loop. It then consumes memory without limit until the process crashes due to running out of memory.

Recommendation

Update the diff package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
diff
Anything's wrong? Let us know Last updated on January 30, 2026