CVE-2026-40073
Request Body Size Limit Bypass in SvelteKit adapter-node Prior to
Publication date: 2026-04-10
Last updated on: 2026-04-15
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| svelte | kit | to 2.57.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in SvelteKit (CVE-2026-40073) allows certain requests to bypass the BODY_SIZE_LIMIT, potentially leading to denial-of-service or resource exhaustion attacks. However, it does not affect confidentiality or integrity of data.
Since the vulnerability does not involve data disclosure or modification, it is unlikely to directly impact compliance with data protection regulations such as GDPR or HIPAA, which primarily focus on protecting personal data confidentiality and integrity.
The potential impact is limited to availability, which may affect service reliability but does not inherently violate these compliance standards unless availability is a critical compliance requirement.
Can you explain this vulnerability to me?
This vulnerability in SvelteKit (prior to version 2.57.1) involves a bypass of the configured BODY_SIZE_LIMIT on applications running with adapter-node. Specifically, under certain conditions, HTTP requests using chunked transfer encoding could send request bodies larger than the allowed size limit without being blocked.
The issue arises because the framework did not properly enforce the body size limit on chunked requests lacking a valid content-length header. The patch fixed this by adding checks to track the cumulative size of chunks and reject requests exceeding the limit with a 413 Payload Too Large error.
How can this vulnerability impact me? :
This vulnerability can allow attackers to send oversized request bodies that bypass the configured size limits in SvelteKit applications using adapter-node. This may lead to resource exhaustion or denial-of-service conditions on the affected application.
However, the impact is limited to availability and is considered low severity. It does not affect confidentiality or integrity of data, and other layers such as WAFs or gateways enforcing body size limits remain effective.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves requests bypassing the BODY_SIZE_LIMIT in SvelteKit applications running with adapter-node, particularly for chunked transfer-encoding requests. Detection involves monitoring HTTP requests for oversized payloads that exceed configured body size limits but are not blocked by the application.
Since the vulnerability relates to improper enforcement of body size limits on chunked requests, you can detect potential exploitation by inspecting HTTP requests with chunked transfer encoding and large or missing Content-Length headers.
Suggested commands to detect suspicious requests might include using network traffic analysis tools or command-line utilities such as:
- Using tcpdump or tshark to capture HTTP traffic and filter for chunked transfer-encoding requests:
- tcpdump -i <interface> -A -s 0 'tcp port 80 or tcp port 443' | grep -i 'transfer-encoding: chunked'
- Using curl or similar tools to test the server by sending chunked requests with payloads exceeding the expected body size limit to see if they are rejected.
- Review application logs for HTTP 413 Payload Too Large errors, which indicate enforcement of body size limits.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation is to upgrade the SvelteKit framework to version 2.57.1 or later, where the vulnerability is fixed.
This update enforces the BODY_SIZE_LIMIT correctly on both chunked and non-chunked HTTP requests, preventing oversized payloads from bypassing size restrictions.
Additionally, ensure that body size limits are also enforced at other layers such as Web Application Firewalls (WAF), gateways, or platform-level controls to provide defense in depth.
Monitoring for HTTP 413 errors can help verify that size limits are being enforced properly after the update.