Seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, serialization of objects with extreme depth can exceed the maximum call stack limit. In version 1.4.1, Seroval introduces a `depthLimit` parameter in serialization/deserialization methods. An error will be thrown if the depth limit is reached.
History

Thu, 22 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 22 Jan 2026 02:45:00 +0000

Type Values Removed Values Added
Description Seroval facilitates JS value stringification, including complex structures beyond JSON.stringify capabilities. In versions 1.4.0 and below, serialization of objects with extreme depth can exceed the maximum call stack limit. In version 1.4.1, Seroval introduces a `depthLimit` parameter in serialization/deserialization methods. An error will be thrown if the depth limit is reached.
Title Seroval affected by Denial of Service via Deeply Nested Objects
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-01-22T02:32:31.913Z

Updated: 2026-01-22T12:50:51.270Z

Reserved: 2026-01-19T18:49:20.659Z

Link: CVE-2026-24006

cve-icon Vulnrichment

Updated: 2026-01-22T12:50:46.861Z

cve-icon NVD

Status : Received

Published: 2026-01-22T03:15:47.933

Modified: 2026-01-22T03:15:47.933

Link: CVE-2026-24006

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-22T02:32:31Z

Links: CVE-2026-24006 - Bugzilla