sse-channel is an SSE-implementation which can be used to any node.js http request/response stream. Prior to 4.0.1, implementations that allow user-provided values to be passed to event, retry or id fields are susceptible to event spoofing, where an attacker could inject arbitrary messages into the stream. This vulnerability is fixed in 4.0.1.
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-84hm-wfh8-c5pg | sse-channel: SSE Injection via unsanitized event fields |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | sse-channel is an SSE-implementation which can be used to any node.js http request/response stream. Prior to 4.0.1, implementations that allow user-provided values to be passed to event, retry or id fields are susceptible to event spoofing, where an attacker could inject arbitrary messages into the stream. This vulnerability is fixed in 4.0.1. | |
| Title | sse-channel: SSE Injection via unsanitized event fields | |
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-12T19:51:06.910Z
Reserved: 2026-05-05T15:13:47.572Z
Link: CVE-2026-44217
No data.
Status : Received
Published: 2026-05-12T20:16:42.513
Modified: 2026-05-12T20:16:42.513
Link: CVE-2026-44217
No data.
OpenCVE Enrichment
Updated: 2026-05-12T21:45:05Z
Weaknesses
Github GHSA