sse-channel is an SSE-implementation which can be used to any node.js http request/response stream. Prior to 4.0.1, implementations that allow user-provided values to be passed to event, retry or id fields are susceptible to event spoofing, where an attacker could inject arbitrary messages into the stream. This vulnerability is fixed in 4.0.1.
Metrics
Affected Vendors & Products
References
History
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | sse-channel is an SSE-implementation which can be used to any node.js http request/response stream. Prior to 4.0.1, implementations that allow user-provided values to be passed to event, retry or id fields are susceptible to event spoofing, where an attacker could inject arbitrary messages into the stream. This vulnerability is fixed in 4.0.1. | |
| Title | sse-channel: SSE Injection via unsanitized event fields | |
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-12T19:51:06.910Z
Reserved: 2026-05-05T15:13:47.572Z
Link: CVE-2026-44217
No data.
Status : Received
Published: 2026-05-12T20:16:42.513
Modified: 2026-05-12T20:16:42.513
Link: CVE-2026-44217
No data.
OpenCVE Enrichment
Updated: 2026-05-12T21:45:05Z