<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Devalue — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/devalue/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 20:27:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/devalue/feed.xml" rel="self" type="application/rss+xml"/><item><title>Svelte devalue Denial-of-Service via Sparse Array Deserialization (CVE-2026-42570)</title><link>https://feed.craftedsignal.io/briefs/2026-05-devalue-dos/</link><pubDate>Thu, 14 May 2026 20:27:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-devalue-dos/</guid><description>The `devalue` package is vulnerable to a denial-of-service (DoS) attack (CVE-2026-42570) due to excessive memory allocation during sparse array deserialization via `devalue.parse`, affecting versions 5.6.3 through 5.8.0.</description><content:encoded><![CDATA[<p>The <code>devalue</code> package, versions 5.6.3 through 5.8.0, is susceptible to a denial-of-service (DoS) vulnerability. The <code>devalue.parse</code> function, when processing crafted inputs, can be tricked into allocating significantly more memory than necessary when deserializing sparse arrays. This behavior stems from quirks in certain JavaScript engines and can lead to excessive memory consumption, potentially crashing the application or server. This vulnerability is identified as CVE-2026-42570 and can be exploited remotely without authentication or user interaction. The vulnerability was patched in version 5.8.1.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious payload containing a specially designed sparse array.</li>
<li>The attacker sends the malicious payload to a server or application that uses the vulnerable <code>devalue</code> library.</li>
<li>The application calls <code>devalue.parse</code> to deserialize the payload.</li>
<li>Due to the structure of the sparse array, the JavaScript engine begins allocating large amounts of memory.</li>
<li>Memory consumption increases rapidly, potentially exhausting available resources.</li>
<li>The application or server becomes unresponsive due to the memory pressure.</li>
<li>The application crashes or the server experiences a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a denial-of-service condition, rendering the affected application or server unavailable. While the precise number of affected systems is unknown, any application utilizing the vulnerable versions of <code>devalue</code> is potentially at risk. The high CVSS score reflects the ease of exploitation and the potential for significant impact on availability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>devalue</code> package to version 5.8.1 or later to remediate the vulnerability.</li>
<li>Monitor application resource consumption (memory, CPU) for unexpected spikes, especially after processing external data.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious devalue.parse Usage</code> to identify potential exploitation attempts in your environment.</li>
<li>Implement rate limiting and input validation to prevent excessive or malformed data from reaching the <code>devalue.parse</code> function.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>cve-2026-42570</category></item></channel></rss>