GHSA-Q5PR-72PQ-83V3: Unbounded Chunked Cookie Count Denial of Service in h3
Vulnerability ID: GHSA-Q5PR-72PQ-83V3
CVSS Score: 7.5
Published: 2026-03-23
A logic-based Denial of Service (DoS) vulnerability exists in the h3 minimal HTTP framework, commonly used in Nuxt and Nitro applications. The vulnerability is caused by an unbounded loop in the chunked cookie parsing logic, allowing remote unauthenticated attackers to exhaust server resources and block the Node.js event loop.
TL;DR
h3 fails to validate the chunk count in chunked cookies. An attacker can supply an artificially high chunk count, forcing the server into an expensive O(n²) loop during session cleanup, completely blocking the Node.js event loop and causing a Denial of Service.
ā ļø Exploit Status: POC
Technical Details
- CWE ID: CWE-606, CWE-400
- Attack Vector: Network
- CVSS Base Score: 7.5
- Impact: High (Denial of Service)
- Exploit Status: Proof of Concept
- KEV Status: Not Listed
Affected Systems
- h3 (npm package)
- Nuxt (via Nitro)
- Nitro engine
-
h3: < 2.0.1-rc.18 (Fixed in:
2.0.1-rc.18)
Code Analysis
Commit: 399257c
Fix unbounded chunked cookie count causing Denial of Service
Mitigation Strategies
- Upgrade the h3 dependency to a version containing the boundary validation patch.
- Deploy a Web Application Firewall (WAF) rule to block cookies with a chunk count exceeding normal boundaries.
- Ensure robust reverse proxy configurations that restrict malformed or excessive HTTP header lengths.
Remediation Steps:
- Identify all projects utilizing h3, Nitro, or Nuxt.
- Execute dependency audits using 'npm audit' or 'yarn audit' to pinpoint vulnerable h3 versions.
- Update the project dependencies to ensure h3 resolves to v2.0.1-rc.18 or higher.
- Rebuild and deploy the application, monitoring for any unexpected session handling regressions.
References
- Official Fix Commit
- H3 Release v2.0.1-rc.18
- GitHub Advisory GHSA-Q5PR-72PQ-83V3
- Nuxt Pull Request #34656 (Security Update)
Read the full report for GHSA-Q5PR-72PQ-83V3 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)