USN-7581-1: Express vulnerabilities

Publication date

19 June 2025

Overview

Several security issues were fixed in Express.


Packages

  • node-express - Fast, unopinionated, minimalist web framework for Node.js

Details

It was discovered that Express incorrectly handled certain URLs, leading
to an open redirect attack. A remote attacker could possibly use this
issue to perform phishing attacks. (CVE-2024-29041)

Adam Korcz discovered that Express did not properly sanitize certain
inputs. A remote attacker could possibly use this issue to perform cross
site scripting. (CVE-2024-43796)

It was discovered that Express incorrectly handled certain URLs, leading
to an open redirect attack. A remote attacker could possibly use this
issue to perform phishing attacks. (CVE-2024-29041)

Adam Korcz discovered that Express did not properly sanitize certain
inputs. A remote attacker could possibly use this issue to perform cross
site scripting. (CVE-2024-43796)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
24.10 oracular node-express –  4.19.2+~cs8.36.26-1ubuntu0.1
24.04 noble node-express –  4.19.2+~cs8.36.21-1ubuntu0.1~esm1  
22.04 jammy node-express –  4.17.3+~4.17.13-1ubuntu0.1~esm1  
20.04 focal node-express –  4.17.1-2ubuntu0.1~esm1  
18.04 bionic node-express –  4.1.1~dfsg-1ubuntu0.18.04.1~esm1  
16.04 xenial node-express –  4.1.1~dfsg-1ubuntu0.16.04.1~esm1  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›