Home

Description

file-type detects the file type of a file, stream, or data. From 20.0.0 to 21.3.1, a crafted ZIP file can trigger excessive memory growth during type detection in file-type when using fileTypeFromBuffer(), fileTypeFromBlob(), or fileTypeFromFile(). The ZIP inflate output limit is enforced for stream-based detection, but not for known-size inputs. As a result, a small compressed ZIP can cause file-type to inflate and process a much larger payload while probing ZIP-based formats such as OOXML. This vulnerability is fixed in 21.3.2.

PUBLISHED Reserved 2026-03-12 | Published 2026-03-13 | Updated 2026-03-13 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-409: Improper Handling of Highly Compressed Data (Data Amplification)

Product status

>= 20.0.0, < 21.3.2
affected

References

github.com/...e-type/security/advisories/GHSA-j47w-4g3g-c36v

github.com/...ommit/399b0f156063f5aeb1c124a7fd61028f3ea7c124

cve.org (CVE-2026-32630)

nvd.nist.gov (CVE-2026-32630)

Download JSON