CVE-2025-48997
JavaScript vulnerability analysis and mitigation

Overview

Multer, a node.js middleware for handling multipart/form-data, contains a vulnerability (CVE-2025-48997) that affects versions from 1.4.4-lts.1 to versions prior to 2.0.1. The vulnerability was discovered and disclosed on June 3, 2025, allowing attackers to trigger a Denial of Service (DoS) condition through an upload file request with an empty string field name (GitHub Advisory).

Technical details

The vulnerability is classified as CWE-248 (Uncaught Exception) with a CVSS v4.0 score of 8.7 (HIGH) and CVSS v3.1 score of 5.3. The issue occurs when processing file uploads where a request contains an empty string field name, leading to an unhandled exception that causes the process to crash. The vulnerability specifically manifests in the file handling functionality of the middleware (NVD, Red Hat).

Impact

When exploited, this vulnerability results in a Denial of Service condition that affects the program integrating Multer. The impact is limited to the application process itself, with no direct effect on the host operating system. The DoS occurs through process termination when handling malformed upload requests (Red Hat).

Mitigation and workarounds

Users are strongly advised to upgrade to Multer version 2.0.1, which contains the patch for this vulnerability. No alternative workarounds are available for this issue. The fix was implemented through a code change that properly handles missing field names (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management