Ad

CVE-2026-35515

MEDIUM CVSS 4.0: 6.3 EPSS 0.01%
Updated Apr 07, 2026
Nest
Parameter Value
CVSS 6.3 (MEDIUM)
Fixed In 11.1.18
Type CWE-74 (Injection)
Vendor Nest
Public PoC No

Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.18, SseStream._transform() interpolates message.type and message.id directly into Server-Sent Events text protocol output without sanitizing newline characters (\r, \n). Since the SSE protocol treats both \r and \n as field delimiters and \n\n as event boundaries, an attacker who can influence these fields through upstream data sources can inject arbitrary SSE events, spoof event types, and corrupt reconnection state.

This vulnerability is fixed in 11.1.18.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
Present
Additional conditions required
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
Low
Partial data modification
Availability
Low
Partial disruption

CVSS Vector v4.0

Weakness Type (CWE)

Related Vulnerabilities