protobuf.js: Denial of service through unbounded protobuf recursion
High severity
GitHub Reviewed
Published
May 12, 2026
in
protobufjs/protobuf.js
•
Updated May 14, 2026
Description
Published to the GitHub Advisory Database
May 12, 2026
Reviewed
May 12, 2026
Published by the National Vulnerability Database
May 13, 2026
Last updated
May 14, 2026
Summary
protobufjs could recurse without a depth limit while decoding nested protobuf data. This affected both skipping unknown group fields and generated decoding of nested message fields.
A crafted protobuf binary payload could cause the JavaScript call stack to be exhausted during decoding.
Impact
An attacker who can provide protobuf binary data decoded by an application may be able to crash the process or otherwise cause decoding to fail with a stack overflow.
This affects applications that decode untrusted protobuf binary input with affected versions.
Preconditions
Workarounds
Avoid decoding untrusted protobuf binary data with affected versions. If immediate upgrade is not possible, reject excessively nested messages at an outer protocol boundary where feasible, or isolate protobuf decoding in a process that can be safely restarted.
References