[GHSA-4www-5p9h-95mh] http-proxy-middleware can call writeBody twice because "else if" is not used #5486
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Updates
Comments
CVE-2025-32996 is not applicable until 1.3.0. The CVE relates to a function called
fixRequestBody
which takes the request body and makes sure that the request body is written in the right format. For example - if thecontent-type
is JSON - it will write the body as a JSON. If it ismultipart/form-data
it will write the body is form-data. The vulnerability allows to write the body as both JSON and form-data and lead to exploits. The functionality offixRequestBody
was not existed until 1.3.0.The code was added in v1.3.0:
https://github.com/chimurai/http-proxy-middleware/tree/v1.3.0/src/handlers
In the following Pull Request:
chimurai/http-proxy-middleware#492