Vulnerabilities/

Undici has CRLF Injection in undici via `upgrade` option

Severity:
Medium

Description

When an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to:

  1. Inject arbitrary HTTP headers
  2. Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)

Recommendation

Update the undici package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
undici
Anything's wrong? Let us know Last updated on March 13, 2026