CVE-2025-7339
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-17

Last updated on: 2025-07-17

Assigner: openjs

Description
on-headers is a node.js middleware for listening to when a response writes headers. A bug in on-headers versions `<1.1.0` may result in response headers being inadvertently modified when an array is passed to `response.writeHead()`.Β Users should upgrade to version 1.1.0 to receive a patch.Β Uses are strongly encouraged to upgrade to `1.1.0`, but this issue can be worked around by passing an object to `response.writeHead()` rather than an array.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-17
Last Modified
2025-07-17
Generated
2026-05-07
AI Q&A
2025-07-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
jshttp on-headers 1.1.0
expressjs morgan 1.10.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-241 The product does not handle or incorrectly handles when a particular element is not the expected type, e.g. it expects a digit (0-9) but is provided with a letter (A-Z).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the on-headers Node.js middleware versions before 1.1.0. It causes response headers to be inadvertently modified when an array is passed to the response.writeHead() function. This unintended modification can lead to unexpected behavior in how HTTP response headers are handled.


How can this vulnerability impact me? :

The vulnerability can cause response headers to be altered unintentionally, which may lead to incorrect or unexpected HTTP responses. This could affect the behavior of web applications relying on correct header information, potentially impacting security controls or application functionality.


What immediate steps should I take to mitigate this vulnerability?

Upgrade the on-headers package to version 1.1.0 or later. Alternatively, as a workaround, ensure that calls to response.writeHead() pass an object instead of an array to avoid the vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart