Vulnerabilities/

qs's arrayLimit bypass in its bracket notation allows DoS via memory exhaustion

Severity:
Medium

Description

The arrayLimit option in qs did not enforce limits for bracket notation (a[]=1&a[]=2), only for indexed notation (a[0]=1). This is a consistency bug; arrayLimit should apply uniformly across all array notations.

Note: The default parameterLimit of 1000 effectively mitigates the DoS scenario originally described.

Recommendation

Update the qs package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
qs
Anything's wrong? Let us know Last updated on March 02, 2026