Duplicate Advisory: express-xss-sanitizer has an unbounded recursion depth
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Sep 15, 2025 
          to the GitHub Advisory Database
          •
          Updated Sep 26, 2025 
      
  
  
      Withdrawn
      This advisory was withdrawn on Sep 26, 2025
  
    
      Description
        Published by the National Vulnerability Database
      Sep 14, 2025 
    
  
        Published to the GitHub Advisory Database
      Sep 15, 2025 
    
  
        Reviewed
      Sep 15, 2025 
    
  
        Withdrawn
      Sep 26, 2025 
    
  
        Last updated
      Sep 26, 2025 
    
  
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-hvq2-wf92-j4f3. This link is maintained to preserve external references.
Original Descripton
The
express-xss-sanitizerpackage for Node.js has an unbounded recursion in thesanitizefunction (lib/sanitize.js) when processing JSON request bodies. A remote attacker can send a deeply nested payload to any endpoint that applies this sanitizer, driving excessive recursion and resource consumption (CPU) until the process becomes unresponsive or crashes (e.g., “Maximum call stack size exceeded”). This causes a denial of service. The issue is present through version 2.0.0; no fixed release is available as of this update.References