CVE-2022-21676
JavaScript vulnerability analysis and mitigation

Overview

Engine.IO, the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO, was found to contain a vulnerability that affects versions 4.0.0 and above. The vulnerability was discovered by Marcus Wejderot from Mevisio and was assigned CVE-2022-21676. The issue was publicly disclosed on January 12, 2022, affecting multiple versions including 4.0.0-4.1.1, 5.0.0-5.2.0, and 6.0.0-6.1.0 (GitHub Advisory).

Technical details

The vulnerability is characterized by an uncaught exception that occurs when processing specially crafted HTTP requests. When exploited, it triggers a RangeError with the message 'Invalid WebSocket frame: RSV2 and RSV3 must be clear' in the WebSocket receiver component. The error occurs specifically in the ws library's receiver.js file, during the frame information processing (GitHub Release).

Impact

When successfully exploited, this vulnerability results in the termination of the Node.js process hosting the Engine.IO server. This can lead to a denial of service condition, affecting not only Engine.IO users but also applications using dependent packages like Socket.IO (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in versions 4.1.2, 5.2.1, and 6.1.1. Users are strongly advised to upgrade to these patched versions. For Socket.IO users, specific version upgrades are recommended: Socket.IO 4.4.x users are safe with the current version, while users of versions 4.0.x-4.2.x should upgrade to 4.4.x. Socket.IO 3.0.x users should upgrade to either 3.1.x or 4.4.x. The fix can be applied using 'npm audit fix' or 'npm update engine.io --depth=9999' (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22787HIGH8.7
  • JavaScriptJavaScript
  • html2pdf.js
NoYesJan 14, 2026
CVE-2026-22820MEDIUM6.3
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22819MEDIUM5.9
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026
GHSA-73rr-hh4g-fpgxLOWN/A
  • JavaScriptJavaScript
  • diff
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management