CVE-2026-32630
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/03/2026
Last modified:
17/03/2026
Description
file-type detects the file type of a file, stream, or data. From 20.0.0 to 21.3.1, a crafted ZIP file can trigger excessive memory growth during type detection in file-type when using fileTypeFromBuffer(), fileTypeFromBlob(), or fileTypeFromFile(). The ZIP inflate output limit is enforced for stream-based detection, but not for known-size inputs. As a result, a small compressed ZIP can cause file-type to inflate and process a much larger payload while probing ZIP-based formats such as OOXML. This vulnerability is fixed in 21.3.2.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sindresorhus:file-type:*:*:*:*:*:node.js:*:* | 20.0.0 (including) | 21.3.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



