May 2025 Security Releases
The Express team has released a new major version of Multer addressing two high-severity security vulnerabilities. This update improves the reliability and security of handling file uploads in Express applications.
Warning
We strongly recommend that you upgrade to Multer v2.0.0 or later as soon as possible.
The following vulnerabilities have been addressed:
- High severity vulnerability CVE-2025-47935 in Multer middleware
- High severity vulnerability CVE-2025-47944 in Multer middleware
High severity vulnerability CVE-2025-47935 in Multer middleware
Multer versions <2.0.0
are vulnerable to denial of service due to a memory leak caused by improper stream handling.
When the HTTP request stream emits an error, the internal busboy
stream is not closed, violating Node.js stream safety guidance.
This leads to unclosed streams accumulating over time, consuming memory and file descriptors. Under sustained or repeated failure conditions, this can result in denial of service, requiring manual server restarts to recover. All users of Multer handling file uploads are potentially impacted.
Affected versions: <2.0.0
Patched version: >=2.0.0
For more details, see GHSA-44fp-w29j-9vj5.
High severity vulnerability CVE-2025-47944 in Multer middleware
Multer versions >=1.4.4-lts.1
and <2.0.0
are vulnerable to a denial of service via a malformed multipart request.
A specially crafted request can cause an unhandled exception inside Multer, resulting in a crash of the server process.
Affected versions: >=1.4.4-lts.1
and <2.0.0
Patched version: >=2.0.0
For more details, see GHSA-4pg4-qvpc-4q3h.
Multer v2.0.0 also introduces a breaking change:
- The minimum supported Node.js version is now 10.16.0.
We recommend upgrading to the latest version of Multer immediately to secure your applications.
Edit this page