seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, overriding encoded array lengths by replacing them with an excessively large value causes the deserialization process to significantly increase processing time. This issue has been fixed in version 1.4.1.
History

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 22 Jan 2026 02:00:00 +0000

Type Values Removed Values Added
Description seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, overriding encoded array lengths by replacing them with an excessively large value causes the deserialization process to significantly increase processing time. This issue has been fixed in version 1.4.1.
Title seroval is vulnerable to Denial of Service via array serialization
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-01-22T01:26:53.869Z

Updated: 2026-01-22T18:56:49.004Z

Reserved: 2026-01-19T14:49:06.313Z

Link: CVE-2026-23957

cve-icon Vulnrichment

Updated: 2026-01-22T18:56:45.897Z

cve-icon NVD

Status : Received

Published: 2026-01-22T02:15:52.470

Modified: 2026-01-22T02:15:52.470

Link: CVE-2026-23957

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-22T01:26:53Z

Links: CVE-2026-23957 - Bugzilla