{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-33151","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-17T21:17:08.885Z","datePublished":"2026-03-20T20:13:31.424Z","dateUpdated":"2026-03-23T16:50:16.998Z"},"containers":{"cna":{"title":"socket.io allows an unbounded number of binary attachments","problemTypes":[{"descriptions":[{"cweId":"CWE-20","lang":"en","description":"CWE-20: Improper Input Validation","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-754","lang":"en","description":"CWE-754: Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9","tags":["x_refsource_CONFIRM"],"url":"https://github.com/socketio/socket.io/security/advisories/GHSA-677m-j7p3-52f9"},{"name":"https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4","tags":["x_refsource_MISC"],"url":"https://github.com/socketio/socket.io/commit/719f9ebab0772ffb882bd614b387e585c1aa75d4"},{"name":"https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf","tags":["x_refsource_MISC"],"url":"https://github.com/socketio/socket.io/commit/9d39f1f080510f036782f2177fac701cc041faaf"},{"name":"https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78","tags":["x_refsource_MISC"],"url":"https://github.com/socketio/socket.io/commit/b25738c416c4e32fbff62ee182afa8f6d0dacf78"}],"affected":[{"vendor":"socketio","product":"socket.io","versions":[{"version":"< 3.3.5","status":"affected"},{"version":">= 3.4.0, < 3.4.4","status":"affected"},{"version":">= 4.0.0, < 4.2.6","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-20T20:13:31.424Z"},"descriptions":[{"lang":"en","value":"Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. Prior to versions 3.3.5, 3.4.4, and 4.2.6, a specially crafted Socket.IO packet can make the server wait for a large number of binary attachments and buffer them, which can be exploited to make the server run out of memory. This issue has been patched in versions 3.3.5, 3.4.4, and 4.2.6."}],"source":{"advisory":"GHSA-677m-j7p3-52f9","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-23T16:50:08.681178Z","id":"CVE-2026-33151","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-23T16:50:16.998Z"}}]}}