Metrics
Affected Vendors & Products
Fri, 17 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nestjs:nest:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 09 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nestjs
Nestjs nest |
|
| Vendors & Products |
Nestjs
Nestjs nest |
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.18, SseStream._transform() interpolates message.type and message.id directly into Server-Sent Events text protocol output without sanitizing newline characters (\r, \n). Since the SSE protocol treats both \r and \n as field delimiters and \n\n as event boundaries, an attacker who can influence these fields through upstream data sources can inject arbitrary SSE events, spoof event types, and corrupt reconnection state. This vulnerability is fixed in 11.1.18. | |
| Title | @nestjs/core Improperly Neutralizes Special Elements in Output Used by a Downstream Component ('Injection') | |
| Weaknesses | CWE-74 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-04-07T15:06:10.619Z
Updated: 2026-04-07T15:58:37.067Z
Reserved: 2026-04-03T02:15:39.280Z
Link: CVE-2026-35515
Updated: 2026-04-07T15:49:00.468Z
Status : Analyzed
Published: 2026-04-07T16:16:27.773
Modified: 2026-04-17T20:36:10.247
Link: CVE-2026-35515