May 2025 Security Releases

By Ulises Gascón
19 May 2025

The Express team has released a new major version of Multer addressing two high-severity security vulnerabilities. This update improves the reliability and security of handling file uploads in Express applications.

Warning

We strongly recommend that you upgrade to Multer v2.0.0 or later as soon as possible.

The following vulnerabilities have been addressed:

High severity vulnerability CVE-2025-47935 in Multer middleware

Multer versions <2.0.0 are vulnerable to denial of service due to a memory leak caused by improper stream handling.

When the HTTP request stream emits an error, the internal busboy stream is not closed, violating Node.js stream safety guidance.

This leads to unclosed streams accumulating over time, consuming memory and file descriptors. Under sustained or repeated failure conditions, this can result in denial of service, requiring manual server restarts to recover. All users of Multer handling file uploads are potentially impacted.

Affected versions: <2.0.0
Patched version: >=2.0.0

For more details, see GHSA-44fp-w29j-9vj5.

High severity vulnerability CVE-2025-47944 in Multer middleware

Multer versions >=1.4.4-lts.1 and <2.0.0 are vulnerable to a denial of service via a malformed multipart request.

A specially crafted request can cause an unhandled exception inside Multer, resulting in a crash of the server process.

Affected versions: >=1.4.4-lts.1 and <2.0.0
Patched version: >=2.0.0

For more details, see GHSA-4pg4-qvpc-4q3h.


Multer v2.0.0 also introduces a breaking change:

We recommend upgrading to the latest version of Multer immediately to secure your applications.

Edit this page