Node.js Fixes Critical DoS Flaw That Could Crash “Virtually Every Production App”

Critical Flaw With Ecosystem-Wide Impact
The Node.js project has released security updates to address a critical issue that could cause denial-of-service (DoS) conditions in what maintainers describe as “virtually every production Node.js app.”
The flaw, tracked as CVE-2025-59466 (CVSS score: 7.5), affects how Node.js handles stack space exhaustion when the low-level async_hooks API is enabled. Under specific conditions, the bug causes Node.js to terminate abruptly instead of throwing a recoverable exception, allowing attackers to crash applications by triggering deep recursion.
Root Cause: Stack Overflow + async_hooks = Hard Crash
Node.js normally attempts to recover gracefully from stack overflows by throwing a catchable error, which many frameworks rely on to maintain availability.
However, maintainers Matteo Collina and Joyee Cheung explained that a long-standing bug breaks this behavior when async_hooks is in use:
“Node.js exits with code 7 directly without throwing a catchable error when recursions in user code exhaust the stack space.”
Exit code 7 corresponds to an Internal Exception Handler Run-Time Failure, meaning the process terminates immediately.
This becomes dangerous when recursion depth is influenced by unsanitized user input, allowing attackers to intentionally crash services.
Offensive Security, Bug Bounty Courses
Why So Many Apps Are Affected
The issue has far-reaching consequences because async_hooks underpins AsyncLocalStorage, which is widely used across the Node.js ecosystem.
As a result, many popular frameworks and observability tools are impacted, including:
- React Server Components
- Next.js
- Datadog
- New Relic
- Dynatrace
- Elastic APM
- OpenTelemetry
Any application or dependency that relies on AsyncLocalStorage for request tracing, context propagation, or monitoring is potentially vulnerable.
Fixed Node.js Versions
The flaw has been addressed in the following releases:
- Node.js 20.20.0 (LTS)
- Node.js 22.22.0 (LTS)
- Node.js 24.13.0 (LTS)
- Node.js 25.3.0 (Current)
The fix ensures that stack overflow errors are re-thrown to user code, restoring predictable error handling instead of triggering a fatal crash.
Older Versions Remain Vulnerable
The issue affects all Node.js versions from 8.x through 18.x, dating back to Node.js 8.0.0 (Carbon) released in May 2017.
However, these versions remain unpatched because they have reached end-of-life (EoL) and no longer receive security updates.
Organizations still running legacy Node.js versions are therefore permanently exposed unless they upgrade.
Why Node.js Calls This a “Mitigation,” Not a Full Fix
Despite its impact, the Node.js team classified the change as a mitigation rather than a strict security fix, citing several reasons:
- Stack space exhaustion is not defined in the ECMAScript specification
- The V8 engine does not consider it a security issue
- Limitations exist with the
uncaughtExceptionhandler, which is intended only as a last-resort mechanism
Still, Node.js acknowledged the real-world consequences:
“We chose to include it in the security release because of its widespread impact on the ecosystem. The fix improves developer experience and makes error handling more predictable.”
Additional High-Severity Fixes Released
Alongside CVE-2025-59466, Node.js also patched three other high-severity vulnerabilities:
- CVE-2025-55131 – Data leakage or corruption
- CVE-2025-55130 – Arbitrary file read via crafted relative symlink paths
- CVE-2025-59465 – Remote denial-of-service
Recommended Actions
Given the scale of impact, Node.js users are strongly advised to:
- Upgrade immediately to a patched Node.js version
- Audit applications for unbounded or user-controlled recursion
- Apply additional safeguards in frameworks and libraries
- Ensure production systems are not running EoL Node.js releases
For organizations relying on React, Next.js, or APM tooling, the update is particularly urgent to avoid trivial service crashes.
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Sources: thehackernews.com












