Description
An Uncontrolled Recursion (CWE-674) vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs.
Recommendation
Update the node-forge package to the latest compatible version. Followings are version details:
- Affected version(s): < 1.3.2
- Patched version(s): 1.3.2
References
Related Issues
- node-forge has an Interpretation Conflict vulnerability via its ASN.1 Validator Desynchronization - CVE-2025-12816
- node-forge is vulnerable to ASN.1 OID Integer Truncation - CVE-2025-66030
- Forge has signature forgery in RSA-PKCS due to ASN.1 extra field - CVE-2026-33894
- Improper Verification of Cryptographic Signature in `node-forge` (GHSA-2r2c-g63r-vccr) - CVE-2022-24773
- Tags:
- npm
- node-forge
Anything's wrong? Let us know Last updated on November 26, 2025