{"id":"BIT-node-min-2026-21713","details":"A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values.\r\n\r\nNode.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision.\r\n\r\nThis vulnerability affects **20.x, 22.x, 24.x, and 25.x**.","aliases":["BIT-node-2026-21713","CVE-2026-21713"],"modified":"2026-04-06T08:41:22.040550201Z","published":"2026-04-06T07:58:50.453Z","database_specific":{"severity":"Medium","cpes":["cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://nodejs.org/en/blog/vulnerability/march-2026-security-releases"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-21713"}],"affected":[{"package":{"name":"node-min","ecosystem":"Bitnami","purl":"pkg:bitnami/node-min"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"20.20.2"},{"introduced":"21.0.0"},{"fixed":"24.14.1"},{"introduced":"25.0.0"},{"fixed":"25.8.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/node-min/BIT-node-min-2026-21713.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}],"schema_version":"1.7.5"}