Vulnerabilities/

qs's arrayLimit bypass in its bracket notation allows DoS via memory exhaustion

Severity:
High

Description

The arrayLimit option in qs does not enforce limits for bracket notation (a[]=1&a[]=2), allowing attackers to cause denial-of-service via memory exhaustion. Applications using arrayLimit for DoS protection are vulnerable.

Recommendation

Update the qs package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
qs
Anything's wrong? Let us know Last updated on December 30, 2025