{
    "document": {
        "category": "csaf_base",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "en",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this portal to enhance access to its information and vulnerabilities. The use of this information is subject to the following terms and conditions:\n\nThe vulnerabilities disclosed in this portal are gathered by NCSC-NL from a variety of open sources, which the user can retrieve from other platforms. NCSC-NL makes every reasonable effort to ensure that the content of this portal is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or real-time keeping up-to-date. NCSC-NL does not control nor guarantee the accuracy, relevance, timeliness or completeness of information obtained from these external sources. The vulnerabilities disclosed in this portal are intended solely for the convenience of professional parties to take appropriate measures to manage the risks posed to the cybersecurity. No rights can be derived from the information provided therein.\n\nNCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of the vulnerabilities disclosed in this portal. This includes damage resulting from the inaccuracy of incompleteness of the information contained in it.\nThe information on this page is subject to Dutch law. All disputes related to or arising from the use of this portal regarding the disclosure of vulnerabilities will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "National Cyber Security Centre",
            "namespace": "https://www.ncsc.nl/"
        },
        "title": "CVE-2026-30827",
        "tracking": {
            "current_release_date": "2026-04-02T13:06:31.979804Z",
            "generator": {
                "date": "2026-02-17T15:00:00Z",
                "engine": {
                    "name": "V.E.L.M.A",
                    "version": "1.7"
                }
            },
            "id": "CVE-2026-30827",
            "initial_release_date": "2026-03-06T18:48:35.881685Z",
            "revision_history": [
                {
                    "date": "2026-03-06T18:48:35.881685Z",
                    "number": "1",
                    "summary": "CVE created.| Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (3).| CWES updated (1)."
                },
                {
                    "date": "2026-03-06T18:48:40.278477Z",
                    "number": "2",
                    "summary": "NCSC Score created."
                },
                {
                    "date": "2026-03-07T00:21:04.757065Z",
                    "number": "3",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products created (4).| Product Identifiers created (1).| References created (2).| CWES updated (1)."
                },
                {
                    "date": "2026-03-07T00:21:12.848906Z",
                    "number": "4",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-07T05:38:41.395164Z",
                    "number": "5",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (3).| References created (2).| CWES updated (1)."
                },
                {
                    "date": "2026-03-07T05:38:45.957607Z",
                    "number": "6",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-07T06:24:58.972607Z",
                    "number": "7",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (2).| CWES updated (1)."
                },
                {
                    "date": "2026-03-07T06:25:06.440109Z",
                    "number": "8",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-07T14:46:36.341691Z",
                    "number": "9",
                    "summary": "Source created.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-03-07T14:46:42.715608Z",
                    "number": "10",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-09T13:39:53.450994Z",
                    "number": "11",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-09T18:21:06.400366Z",
                    "number": "12",
                    "summary": "References created (1)."
                },
                {
                    "date": "2026-03-09T18:21:10.734549Z",
                    "number": "13",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-09T21:39:00.276822Z",
                    "number": "14",
                    "summary": "Unknown change."
                },
                {
                    "date": "2026-03-10T00:27:45.313394Z",
                    "number": "15",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (8).| Product Identifiers created (4).| Product Remediations created (8).| References created (4).| CWES updated (1).| Vendor_assessment created."
                },
                {
                    "date": "2026-03-10T00:27:56.767500Z",
                    "number": "16",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-11T19:25:04.528159Z",
                    "number": "17",
                    "summary": "Products created (3).| Product Identifiers created (3).| Exploits created (1)."
                },
                {
                    "date": "2026-03-11T19:25:09.337426Z",
                    "number": "18",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-19T15:29:26.173351Z",
                    "number": "19",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (4).| CWES updated (1)."
                },
                {
                    "date": "2026-03-19T15:29:28.082284Z",
                    "number": "20",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-20T09:33:58.079916Z",
                    "number": "21",
                    "summary": "Source connected.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-04-01T11:28:49.192182Z",
                    "number": "22",
                    "summary": "Source connected.| CVE status created. (valid)| Products connected (2).| References created (4)."
                },
                {
                    "date": "2026-04-01T11:28:52.015643Z",
                    "number": "23",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-04-01T12:36:20.366399Z",
                    "number": "24",
                    "summary": "Source connected.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (29).| Product Remediations created (31).| Product Identifiers created (104).| Product Identifiers removed (104).| References created (20).| CWES updated (1)."
                },
                {
                    "date": "2026-04-01T12:36:42.276657Z",
                    "number": "25",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-04-02T09:05:43.988826Z",
                    "number": "26",
                    "summary": "Products connected (3).| References created (4)."
                },
                {
                    "date": "2026-04-02T09:05:52.640338Z",
                    "number": "27",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-04-02T12:29:13.328644Z",
                    "number": "28",
                    "summary": "Source connected.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (28).| Product Remediations created (30).| Product Identifiers created (100).| Product Identifiers removed (100).| References created (20).| CWES updated (1)."
                },
                {
                    "date": "2026-04-02T12:29:28.828321Z",
                    "number": "29",
                    "summary": "NCSC Score updated."
                }
            ],
            "status": "interim",
            "version": "29"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1330296",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:amazon:linux_2:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Amazon Linux 2"
                    }
                ],
                "category": "vendor",
                "name": "Amazon"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/<2.5",
                                "product": {
                                    "name": "vers:unknown/<2.5",
                                    "product_id": "CSAFPID-1384077"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/<2.6",
                                "product": {
                                    "name": "vers:unknown/<2.6",
                                    "product_id": "CSAFPID-5354794"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Ansible Automation Platform"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/2",
                                "product": {
                                    "name": "vers:rpm/2",
                                    "product_id": "CSAFPID-1508257",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:ansible_automation_platform:2"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Ansible Automation Platform 2"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/2.6",
                                        "product": {
                                            "name": "vers:rpm/2.6",
                                            "product_id": "CSAFPID-5153949",
                                            "product_identification_helper": {
                                                "cpe": "cpe:/a:redhat:ansible_automation_platform:2.6::el9"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "Red Hat Ansible Automation Platform 2.6"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774139204",
                                        "product": {
                                            "name": "vers:oci/1774139204",
                                            "product_id": "CSAFPID-5973066",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/aap-must-gather-rhel9@sha256%3Ae43db60ae78ea52aa60425b0bcd13d5660a72a3e888baa043125040df3b1e499?arch=s390x&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774139204"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "aap-must-gather-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774153089",
                                        "product": {
                                            "name": "vers:oci/1774153089",
                                            "product_id": "CSAFPID-5973067",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/ansible-builder-rhel9@sha256%3Adb8e631f92329e1da78b76a7d510e6dace445aecdcba5b7d65896c4dde5b6d96?arch=amd64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774153089"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "ansible-builder-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774585183",
                                        "product": {
                                            "name": "vers:oci/1774585183",
                                            "product_id": "CSAFPID-5973068",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/ansible-dev-tools-rhel9@sha256%3A8f6d6144ac73ba9f0133ca1303405cb9f28309cea10213ad2a6745fe91221075?arch=s390x&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774585183"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "ansible-dev-tools-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774368903",
                                        "product": {
                                            "name": "vers:oci/1774368903",
                                            "product_id": "CSAFPID-5973070",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/controller-rhel9@sha256%3Aa490261dea13fa75a1c4aa0a175da144c26a5dc727dc542609c25655adeb8819?arch=arm64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774368903"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "controller-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774484033",
                                        "product": {
                                            "name": "vers:oci/1774484033",
                                            "product_id": "CSAFPID-5973069",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/controller-rhel9-operator@sha256%3Aee388c6cde6ddc916d0a727de14bf27aa2b4b276c10b252132ca3db00f4d5bc6?arch=amd64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774484033"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "controller-rhel9-operator"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774487884",
                                        "product": {
                                            "name": "vers:oci/1774487884",
                                            "product_id": "CSAFPID-5973071",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/de-minimal-rhel9@sha256%3Ac67254bbf63fe1220d58de04f36770afd4a6835a8903d03233310b13ed134a3b?arch=arm64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774487884"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "de-minimal-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774490244",
                                        "product": {
                                            "name": "vers:oci/1774490244",
                                            "product_id": "CSAFPID-5973072",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/de-supported-rhel9@sha256%3Afa5dd987c4032dd4749f81e265456b1abd3063c2b134434c32006d4a124a9dca?arch=s390x&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774490244"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "de-supported-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774258433",
                                        "product": {
                                            "name": "vers:oci/1774258433",
                                            "product_id": "CSAFPID-5973074",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/eda-controller-rhel9@sha256%3Af720d731ed73925d2e5b2eff3c2c821a0600352546577c5b45c087de78b6a95b?arch=ppc64le&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774258433"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "eda-controller-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774484073",
                                        "product": {
                                            "name": "vers:oci/1774484073",
                                            "product_id": "CSAFPID-5973073",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/eda-controller-rhel9-operator@sha256%3Afe0b1298bb9dbe8b981b83ac31761c3cf174dbc5b6adc6e3df39e7a238349822?arch=s390x&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774484073"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "eda-controller-rhel9-operator"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774484106",
                                        "product": {
                                            "name": "vers:oci/1774484106",
                                            "product_id": "CSAFPID-5973075",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/eda-controller-ui-rhel9@sha256%3Af95849a65d7c218be6c34619a8c8502f213d96f745ff73525fa898560230cafd?arch=ppc64le&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774484106"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "eda-controller-ui-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774311517",
                                        "product": {
                                            "name": "vers:oci/1774311517",
                                            "product_id": "CSAFPID-5973076",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/ee-minimal-rhel9@sha256%3Ab77fba98853eb0fabcbcd4981c347cf909f50e64ea32f4c0d8313d89cdb48cf7?arch=amd64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774311517"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "ee-minimal-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774321273",
                                        "product": {
                                            "name": "vers:oci/1774321273",
                                            "product_id": "CSAFPID-5973077",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/ee-supported-rhel9@sha256%3Ad6adc9bd2df9fded6228ddd5dbca3919991913b40fb95b12d4d01cf96c5f4d60?arch=arm64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774321273"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "ee-supported-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774139334",
                                        "product": {
                                            "name": "vers:oci/1774139334",
                                            "product_id": "CSAFPID-5973078",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/gateway-proxy-rhel9@sha256%3A92c85eabe94b95c63307991c3881acbd34a808c4f34ca57c66a97550ee51b884?arch=s390x&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774139334"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "gateway-proxy-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774243862",
                                        "product": {
                                            "name": "vers:oci/1774243862",
                                            "product_id": "CSAFPID-5973080",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/gateway-rhel9@sha256%3Aed7a7ba7daf1a16a600af6cf4a875588a4647f5541cb309634aaba6614abf027?arch=ppc64le&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774243862"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "gateway-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774484129",
                                        "product": {
                                            "name": "vers:oci/1774484129",
                                            "product_id": "CSAFPID-5973079",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/gateway-rhel9-operator@sha256%3Af0e905a88c717e674b96a13545fbeda55c7cc265e0cda3ef8e01f9b06d18a478?arch=arm64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774484129"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "gateway-rhel9-operator"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774644659",
                                        "product": {
                                            "name": "vers:oci/1774644659",
                                            "product_id": "CSAFPID-5973082",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/hub-rhel9@sha256%3Ad204205c731ab29336afda6a28becce7500485001ca550ffd01432e9c0a291eb?arch=ppc64le&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774644659"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "hub-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774484154",
                                        "product": {
                                            "name": "vers:oci/1774484154",
                                            "product_id": "CSAFPID-5973081",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/hub-rhel9-operator@sha256%3Aa89fe49e49cfd10c9a11420eee13a1c813524524435b51a5d2ee729f4114b951?arch=ppc64le&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774484154"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "hub-rhel9-operator"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774647780",
                                        "product": {
                                            "name": "vers:oci/1774647780",
                                            "product_id": "CSAFPID-5973083",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/hub-web-rhel9@sha256%3Afad44c5cdfad40cae6acb29a6a543f1b830ca057f531263280a28ffffc5bd2c5?arch=s390x&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774647780"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "hub-web-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774417022",
                                        "product": {
                                            "name": "vers:oci/1774417022",
                                            "product_id": "CSAFPID-5973065",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/lightspeed-chatbot-rhel9@sha256%3Ad17dce8e1cc199e35217043b9b80a0d748520cf40204713ba872b5ce14ebf7cc?arch=amd64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774417022"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "lightspeed-chatbot-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774363040",
                                        "product": {
                                            "name": "vers:oci/1774363040",
                                            "product_id": "CSAFPID-5973085",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/lightspeed-rhel9@sha256%3Adb0b40d9a8190c7598de5537df75c83923a48d1927d733ceef4764d35d8056d7?arch=ppc64le&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774363040"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "lightspeed-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774484113",
                                        "product": {
                                            "name": "vers:oci/1774484113",
                                            "product_id": "CSAFPID-5973084",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/lightspeed-rhel9-operator@sha256%3Accf651f792eb389d5cb6516728c6cc5a031e647de3a18cf5d51f3bd2819804b2?arch=arm64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774484113"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "lightspeed-rhel9-operator"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774268173",
                                        "product": {
                                            "name": "vers:oci/1774268173",
                                            "product_id": "CSAFPID-5973090",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/mcp-server-rhel9@sha256%3A6375a3333e8e8443dd702ed5235ddf9b3b6578a6024a917455fdd82f1f38d004?arch=arm64&repository_url=registry.redhat.io/ansible-automation-platform-tech-preview&tag=1774268173"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "mcp-server-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774268174",
                                        "product": {
                                            "name": "vers:oci/1774268174",
                                            "product_id": "CSAFPID-5973086",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/mcp-tools-rhel9@sha256%3A7510d2566f94e33ef189efd5d92a9e213c5cf50610765c255160851538cb7082?arch=ppc64le&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774268174"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "mcp-tools-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774540248",
                                        "product": {
                                            "name": "vers:oci/1774540248",
                                            "product_id": "CSAFPID-5984227",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/metrics-service-rhel9@sha256%3Ac8425cc65b52b3b3538036873f74e4fd9dbeec54254f95f94108003421f45b4e?arch=s390x&repository_url=registry.redhat.io/ansible-automation-platform-tech-preview&tag=1774540248"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "metrics-service-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774648896",
                                        "product": {
                                            "name": "vers:oci/1774648896",
                                            "product_id": "CSAFPID-5973091",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/platform-operator-bundle@sha256%3A79abdf5f9c95b6792765db2b69c8b6cb68eef889674d39203080044bee5fc556?arch=amd64&repository_url=registry.redhat.io/ansible-automation-platform&tag=1774648896"
                                            }
                                        }
                                    },
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774648925",
                                        "product": {
                                            "name": "vers:oci/1774648925",
                                            "product_id": "CSAFPID-5973092",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/platform-operator-bundle@sha256%3Af27581c3a84be7fc387d230aad9e3922caac3f5c59aff779a60aa149877f48e1?arch=amd64&repository_url=registry.redhat.io/ansible-automation-platform&tag=1774648925"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "platform-operator-bundle"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774484549",
                                        "product": {
                                            "name": "vers:oci/1774484549",
                                            "product_id": "CSAFPID-5973087",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/platform-resource-rhel9-operator@sha256%3Abc51280e45f6375ca3d45d859161790934ef76ed59c747a2960720d58c7ee219?arch=arm64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774484549"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "platform-resource-rhel9-operator"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774485790",
                                        "product": {
                                            "name": "vers:oci/1774485790",
                                            "product_id": "CSAFPID-5973088",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/platform-resource-runner-rhel9@sha256%3Af0bc302bdd30b28257768ad3756173b4bc63c2d11b3d673e3df4bfa596224b51?arch=amd64&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774485790"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "platform-resource-runner-rhel9"
                            },
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:oci/1774573035",
                                        "product": {
                                            "name": "vers:oci/1774573035",
                                            "product_id": "CSAFPID-5973089",
                                            "product_identification_helper": {
                                                "purl": "pkg:oci/receptor-rhel9@sha256%3Af00b87dd79fb1e56c8f4368026c9aed45ab5febe832bd98a7c718f965ab6656c?arch=s390x&repository_url=registry.redhat.io/ansible-automation-platform-26&tag=1774573035"
                                            }
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "receptor-rhel9"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Ansible Automation Platform"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/1",
                                "product": {
                                    "name": "vers:rpm/1",
                                    "product_id": "CSAFPID-1508265",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:rhdh:1"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Developer Hub"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1317175",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:redhat:enterprise_linux:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat Enterprise Linux"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/3",
                                "product": {
                                    "name": "vers:rpm/3",
                                    "product_id": "CSAFPID-1441150",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:openshift_devspaces:3:"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Red Hat OpenShift Dev Spaces"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:rpm/2",
                                "product": {
                                    "name": "vers:rpm/2",
                                    "product_id": "CSAFPID-5486263",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/a:redhat:ansible_portal:2"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Self-service automation portal 2"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-5486265"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "automation-portal"
                            }
                        ],
                        "category": "product_family",
                        "name": "Self-service automation portal 2"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-5449645"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "mcp-server-rhel9"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Ansible Automation Platform 2"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-4534155"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "openvsx-rhel9"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat OpenShift Dev Spaces"
                    },
                    {
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "vers:rpm/unknown",
                                        "product": {
                                            "name": "vers:rpm/unknown",
                                            "product_id": "CSAFPID-1508266"
                                        }
                                    }
                                ],
                                "category": "product_name",
                                "name": "rhdh-hub-rhel9"
                            }
                        ],
                        "category": "product_family",
                        "name": "Red Hat Developer Hub"
                    }
                ],
                "category": "vendor",
                "name": "Red Hat"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/unknown",
                                "product": {
                                    "name": "vers:unknown/unknown",
                                    "product_id": "CSAFPID-1317174",
                                    "product_identification_helper": {
                                        "cpe": "cpe:/o:suse:suse_linux:-"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "SuSE Linux"
                    }
                ],
                "category": "vendor",
                "name": "SUSE"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/8.1.0",
                                "product": {
                                    "name": "vers:unknown/8.1.0",
                                    "product_id": "CSAFPID-5767904",
                                    "product_identification_helper": {
                                        "purl": "pkg:npm/express-rate-limit@8.1.0"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=8.0.0|<8.0.2",
                                "product": {
                                    "name": "vers:unknown/>=8.0.0|<8.0.2",
                                    "product_id": "CSAFPID-5767906"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=8.1.0|<8.1.1",
                                "product": {
                                    "name": "vers:unknown/>=8.1.0|<8.1.1",
                                    "product_id": "CSAFPID-5767905"
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=8.2.0|<8.2.2",
                                "product": {
                                    "name": "vers:unknown/>=8.2.0|<8.2.2",
                                    "product_id": "CSAFPID-5767903"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "express-rate-limit"
                    }
                ],
                "category": "vendor",
                "name": "express-rate-limit"
            },
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/8.1.0",
                                "product": {
                                    "name": "vers:unknown/8.1.0",
                                    "product_id": "CSAFPID-5798482",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:a:express-rate-limit_project:express-rate-limit:8.1.0:*:*:*:*:*:*:*"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=8.0.0|<8.0.2",
                                "product": {
                                    "name": "vers:unknown/>=8.0.0|<8.0.2",
                                    "product_id": "CSAFPID-5798480",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:a:express-rate-limit_project:express-rate-limit:*:*:*:*:*:*:*:*"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=8.2.0|<8.2.2",
                                "product": {
                                    "name": "vers:unknown/>=8.2.0|<8.2.2",
                                    "product_id": "CSAFPID-5798481",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:a:express-rate-limit_project:express-rate-limit:*:*:*:*:*:*:*:*"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "express-rate-limit"
                    }
                ],
                "category": "vendor",
                "name": "express-rate-limit_project"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2026-30827",
            "cwe": {
                "id": "CWE-770",
                "name": "Allocation of Resources Without Limits or Throttling"
            },
            "flags": [
                {
                    "label": "vulnerable_code_not_present",
                    "product_ids": [
                        "CSAFPID-5973065",
                        "CSAFPID-5973066",
                        "CSAFPID-5973067",
                        "CSAFPID-5973068",
                        "CSAFPID-5973069",
                        "CSAFPID-5973070",
                        "CSAFPID-5973071",
                        "CSAFPID-5973072",
                        "CSAFPID-5973073",
                        "CSAFPID-5973074",
                        "CSAFPID-5973075",
                        "CSAFPID-5973076",
                        "CSAFPID-5973077",
                        "CSAFPID-5973078",
                        "CSAFPID-5973079",
                        "CSAFPID-5973080",
                        "CSAFPID-5973081",
                        "CSAFPID-5973082",
                        "CSAFPID-5973083",
                        "CSAFPID-5973084",
                        "CSAFPID-5973085",
                        "CSAFPID-5973086",
                        "CSAFPID-5973087",
                        "CSAFPID-5973088",
                        "CSAFPID-5973089",
                        "CSAFPID-5973091",
                        "CSAFPID-5973092",
                        "CSAFPID-5973065",
                        "CSAFPID-5973066",
                        "CSAFPID-5973067",
                        "CSAFPID-5973068",
                        "CSAFPID-5973069",
                        "CSAFPID-5973070",
                        "CSAFPID-5973071",
                        "CSAFPID-5973072",
                        "CSAFPID-5973073",
                        "CSAFPID-5973074",
                        "CSAFPID-5973075",
                        "CSAFPID-5973078",
                        "CSAFPID-5973079",
                        "CSAFPID-5973080",
                        "CSAFPID-5973081",
                        "CSAFPID-5973082",
                        "CSAFPID-5973083",
                        "CSAFPID-5973084",
                        "CSAFPID-5973085",
                        "CSAFPID-5973086",
                        "CSAFPID-5973087",
                        "CSAFPID-5973088",
                        "CSAFPID-5973089",
                        "CSAFPID-5973091",
                        "CSAFPID-5973092",
                        "CSAFPID-5984227"
                    ]
                }
            ],
            "notes": [
                {
                    "category": "description",
                    "text": "## Summary\n\nThe default `keyGenerator` in express-rate-limit applies IPv6 subnet masking (`/56` by default) to all addresses that `net.isIPv6()` returns true for. This includes IPv4-mapped IPv6 addresses (`::ffff:x.x.x.x`), which Node.js returns as `request.ip` on dual-stack servers.\n\nBecause the first 80 bits of all IPv4-mapped addresses are zero, a `/56` (or any `/32` to `/80`) subnet mask produces the same network key (`::/56`) for **every** IPv4 client. This collapses all IPv4 traffic into a single rate-limit bucket: one client exhausting the limit causes HTTP 429 for all other IPv4 clients.\n\n## Details\n\n### Root Cause\n\nIn `source/ip-key-generator.ts`:\n\n```typescript\nexport function ipKeyGenerator(ip: string, ipv6Subnet: number | false = 56) {\n  if (ipv6Subnet && isIPv6(ip)) {\n    return `${new Address6(`${ip}/${ipv6Subnet}`).startAddress().correctForm()}/${ipv6Subnet}`\n  }\n  return ip\n}\n```\n\n`net.isIPv6('::ffff:192.168.1.1')` returns `true`, so IPv4-mapped addresses enter the subnet masking path. With a `/56` prefix, the start address for any `::ffff:x.x.x.x` is `::`, producing the key `::/56`.\n\n### Proof of Concept\n\n```javascript\nconst { isIPv6 } = require('net');\nconst { Address6 } = require('ip-address');\n\nfunction ipKeyGenerator(ip, ipv6Subnet = 56) {\n  if (ipv6Subnet && isIPv6(ip)) {\n    return `${new Address6(`${ip}/${ipv6Subnet}`).startAddress().correctForm()}/${ipv6Subnet}`;\n  }\n  return ip;\n}\n\nconsole.log(ipKeyGenerator('::ffff:192.168.1.1', 56)); // ::/56\nconsole.log(ipKeyGenerator('::ffff:10.0.0.1', 56));    // ::/56\nconsole.log(ipKeyGenerator('::ffff:8.8.8.8', 56));     // ::/56\n// ALL produce '::/56' — same bucket\n```\n\n### End-to-End Validation\n\nOn a dual-stack Express server (`app.listen(port, '::')`), tested with Express 5.2.1:\n- `request.ip` for IPv4 clients is `::ffff:127.0.0.1`\n- Rate limit key resolves to `::/56`\n- After `limit` requests from any IPv4 client, all other IPv4 clients receive 429\n\n### When This Occurs\n\n- Node.js dual-stack servers (default on Linux when listening on `::`)\n- Any environment where `request.ip` contains IPv4-mapped IPv6 addresses\n- Only affects the default `keyGenerator` (custom key generators are not affected)\n\n## Impact\n\n- **Denial of Service**: A single client can block all IPv4 traffic by exhausting the shared rate limit\n- **Affects default configuration**: No special options needed to trigger this\n\n## Affected Versions\n\nAll versions of express-rate-limit between v8.0.0 and v8.2.1.\n\n## Fix\n\nThis issue was fixed in commit 14e53888cdfd1b9798faf5b634c4206409e27fc4. This fix has been included in release v8.3.0, and backported to all affected minor versions in the form of releases v8.2.2, v8.1.1, and v8.0.2.",
                    "title": "github - https://github.com/advisories/GHSA-46wh-pxpv-q5gq"
                },
                {
                    "category": "description",
                    "text": "## Summary\n\nThe default `keyGenerator` in express-rate-limit applies IPv6 subnet masking (`/56` by default) to all addresses that `net.isIPv6()` returns true for. This includes IPv4-mapped IPv6 addresses (`::ffff:x.x.x.x`), which Node.js returns as `request.ip` on dual-stack servers.\n\nBecause the first 80 bits of all IPv4-mapped addresses are zero, a `/56` (or any `/32` to `/80`) subnet mask produces the same network key (`::/56`) for **every** IPv4 client. This collapses all IPv4 traffic into a single rate-limit bucket: one client exhausting the limit causes HTTP 429 for all other IPv4 clients.\n\n## Details\n\n### Root Cause\n\nIn `source/ip-key-generator.ts`:\n\n```typescript\nexport function ipKeyGenerator(ip: string, ipv6Subnet: number | false = 56) {\n  if (ipv6Subnet && isIPv6(ip)) {\n    return `${new Address6(`${ip}/${ipv6Subnet}`).startAddress().correctForm()}/${ipv6Subnet}`\n  }\n  return ip\n}\n```\n\n`net.isIPv6('::ffff:192.168.1.1')` returns `true`, so IPv4-mapped addresses enter the subnet masking path. With a `/56` prefix, the start address for any `::ffff:x.x.x.x` is `::`, producing the key `::/56`.\n\n### Proof of Concept\n\n```javascript\nconst { isIPv6 } = require('net');\nconst { Address6 } = require('ip-address');\n\nfunction ipKeyGenerator(ip, ipv6Subnet = 56) {\n  if (ipv6Subnet && isIPv6(ip)) {\n    return `${new Address6(`${ip}/${ipv6Subnet}`).startAddress().correctForm()}/${ipv6Subnet}`;\n  }\n  return ip;\n}\n\nconsole.log(ipKeyGenerator('::ffff:192.168.1.1', 56)); // ::/56\nconsole.log(ipKeyGenerator('::ffff:10.0.0.1', 56));    // ::/56\nconsole.log(ipKeyGenerator('::ffff:8.8.8.8', 56));     // ::/56\n// ALL produce '::/56' — same bucket\n```\n\n### End-to-End Validation\n\nOn a dual-stack Express server (`app.listen(port, '::')`), tested with Express 5.2.1:\n- `request.ip` for IPv4 clients is `::ffff:127.0.0.1`\n- Rate limit key resolves to `::/56`\n- After `limit` requests from any IPv4 client, all other IPv4 clients receive 429\n\n### When This Occurs\n\n- Node.js dual-stack servers (default on Linux when listening on `::`)\n- Any environment where `request.ip` contains IPv4-mapped IPv6 addresses\n- Only affects the default `keyGenerator` (custom key generators are not affected)\n\n## Impact\n\n- **Denial of Service**: A single client can block all IPv4 traffic by exhausting the shared rate limit\n- **Affects default configuration**: No special options needed to trigger this\n\n## Affected Versions\n\nAll versions of express-rate-limit between v8.0.0 and v8.2.1.\n\n## Fix\n\nThis issue was fixed in commit 14e53888cdfd1b9798faf5b634c4206409e27fc4. This fix has been included in release v8.3.0, and backported to all affected minor versions in the form of releases v8.2.2, v8.1.1, and v8.0.2.",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/npm%2FGHSA-46wh-pxpv-q5gq.json?alt=media"
                },
                {
                    "category": "description",
                    "text": "express-rate-limit is a basic rate-limiting middleware for Express. In versions starting from 8.0.0 and prior to versions 8.0.2, 8.1.1, 8.2.2, and 8.3.0, the default keyGenerator in express-rate-limit applies IPv6 subnet masking (/56 by default) to all addresses that net.isIPv6() returns true for. This includes IPv4-mapped IPv6 addresses (::ffff:x.x.x.x), which Node.js returns as request.ip on dual-stack servers. Because the first 80 bits of all IPv4-mapped addresses are zero, a /56 (or any /32 to /80) subnet mask produces the same network key (::/56) for every IPv4 client. This collapses all IPv4 traffic into a single rate-limit bucket: one client exhausting the limit causes HTTP 429 for all other IPv4 clients. This issue has been patched in versions 8.0.2, 8.1.1, 8.2.2, and 8.3.0.",
                    "title": "cveprojectv5 - https://www.cve.org/CVERecord?id=CVE-2026-30827"
                },
                {
                    "category": "description",
                    "text": "express-rate-limit is a basic rate-limiting middleware for Express. In versions starting from 8.0.0 and prior to versions 8.0.2, 8.1.1, 8.2.2, and 8.3.0, the default keyGenerator in express-rate-limit applies IPv6 subnet masking (/56 by default) to all addresses that net.isIPv6() returns true for. This includes IPv4-mapped IPv6 addresses (::ffff:x.x.x.x), which Node.js returns as request.ip on dual-stack servers. Because the first 80 bits of all IPv4-mapped addresses are zero, a /56 (or any /32 to /80) subnet mask produces the same network key (::/56) for every IPv4 client. This collapses all IPv4 traffic into a single rate-limit bucket: one client exhausting the limit causes HTTP 429 for all other IPv4 clients. This issue has been patched in versions 8.0.2, 8.1.1, 8.2.2, and 8.3.0.",
                    "title": "nvd - https://nvd.nist.gov/vuln/detail/CVE-2026-30827"
                },
                {
                    "category": "description",
                    "text": "express-rate-limit is a basic rate-limiting middleware for Express. In versions starting from 8.0.0 and prior to versions 8.0.2, 8.1.1, 8.2.2, and 8.3.0, the default keyGenerator in express-rate-limit applies IPv6 subnet masking (/56 by default) to all addresses that net.isIPv6() returns true for. This includes IPv4-mapped IPv6 addresses (::ffff:x.x.x.x), which Node.js returns as request.ip on dual-stack servers. Because the first 80 bits of all IPv4-mapped addresses are zero, a /56 (or any /32 to /80) subnet mask produces the same network key (::/56) for every IPv4 client. This collapses all IPv4 traffic into a single rate-limit bucket: one client exhausting the limit causes HTTP 429 for all other IPv4 clients. This issue has been patched in versions 8.0.2, 8.1.1, 8.2.2, and 8.3.0.",
                    "title": "redhat - https://access.redhat.com/security/cve/CVE-2026-30827"
                },
                {
                    "category": "description",
                    "text": "## Summary\n\nThe default `keyGenerator` in express-rate-limit applies IPv6 subnet masking (`/56` by default) to all addresses that `net.isIPv6()` returns true for. This includes IPv4-mapped IPv6 addresses (`::ffff:x.x.x.x`), which Node.js returns as `request.ip` on dual-stack servers.\n\nBecause the first 80 bits of all IPv4-mapped addresses are zero, a `/56` (or any `/32` to `/80`) subnet mask produces the same network key (`::/56`) for **every** IPv4 client. This collapses all IPv4 traffic into a single rate-limit bucket: one client exhausting the limit causes HTTP 429 for all other IPv4 clients.\n\n## Details\n\n### Root Cause\n\nIn `source/ip-key-generator.ts`:\n\n```typescript\nexport function ipKeyGenerator(ip: string, ipv6Subnet: number | false = 56) {\n  if (ipv6Subnet && isIPv6(ip)) {\n    return `${new Address6(`${ip}/${ipv6Subnet}`).startAddress().correctForm()}/${ipv6Subnet}`\n  }\n  return ip\n}\n```\n\n`net.isIPv6('::ffff:192.168.1.1')` returns `true`, so IPv4-mapped addresses enter the subnet masking path. With a `/56` prefix, the start address for any `::ffff:x.x.x.x` is `::`, producing the key `::/56`.\n\n### Proof of Concept\n\n```javascript\nconst { isIPv6 } = require('net');\nconst { Address6 } = require('ip-address');\n\nfunction ipKeyGenerator(ip, ipv6Subnet = 56) {\n  if (ipv6Subnet && isIPv6(ip)) {\n    return `${new Address6(`${ip}/${ipv6Subnet}`).startAddress().correctForm()}/${ipv6Subnet}`;\n  }\n  return ip;\n}\n\nconsole.log(ipKeyGenerator('::ffff:192.168.1.1', 56)); // ::/56\nconsole.log(ipKeyGenerator('::ffff:10.0.0.1', 56));    // ::/56\nconsole.log(ipKeyGenerator('::ffff:8.8.8.8', 56));     // ::/56\n// ALL produce '::/56' — same bucket\n```\n\n### End-to-End Validation\n\nOn a dual-stack Express server (`app.listen(port, '::')`), tested with Express 5.2.1:\n- `request.ip` for IPv4 clients is `::ffff:127.0.0.1`\n- Rate limit key resolves to `::/56`\n- After `limit` requests from any IPv4 client, all other IPv4 clients receive 429\n\n### When This Occurs\n\n- Node.js dual-stack servers (default on Linux when listening on `::`)\n- Any environment where `request.ip` contains IPv4-mapped IPv6 addresses\n- Only affects the default `keyGenerator` (custom key generators are not affected)\n\n## Impact\n\n- **Denial of Service**: A single client can block all IPv4 traffic by exhausting the shared rate limit\n- **Affects default configuration**: No special options needed to trigger this\n\n## Affected Versions\n\nAll versions of express-rate-limit between v8.0.0 and v8.2.1.\n\n## Fix\n\nThis issue was fixed in commit 14e53888cdfd1b9798faf5b634c4206409e27fc4. This fix has been included in release v8.3.0, and backported to all affected minor versions in the form of releases v8.2.2, v8.1.1, and v8.0.2.",
                    "title": "github - https://api.github.com/advisories/GHSA-46wh-pxpv-q5gq"
                },
                {
                    "category": "description",
                    "text": "A flaw was found in express-rate-limit. The default key generator incorrectly applies IPv6 subnet masking to IPv4-mapped IPv6 addresses, which are used when an IPv4 client connects to a dual-stack server. This misconfiguration causes all IPv4 traffic to be treated as a single entity for rate limiting. Consequently, a remote attacker can exhaust the rate limit with a single client, leading to a Denial of Service (DoS) for all other IPv4 clients by causing them to receive HTTP 429 errors.",
                    "title": "redhat - https://access.redhat.com/hydra/rest/securitydata/csaf/RHSA-2026:6309.json"
                },
                {
                    "category": "description",
                    "text": "A flaw was found in express-rate-limit. The default key generator incorrectly applies IPv6 subnet masking to IPv4-mapped IPv6 addresses, which are used when an IPv4 client connects to a dual-stack server. This misconfiguration causes all IPv4 traffic to be treated as a single entity for rate limiting. Consequently, a remote attacker can exhaust the rate limit with a single client, leading to a Denial of Service (DoS) for all other IPv4 clients by causing them to receive HTTP 429 errors.",
                    "title": "redhat - https://access.redhat.com/hydra/rest/securitydata/csaf/RHSA-2026:6404.json"
                },
                {
                    "category": "other",
                    "text": "0.00017",
                    "title": "EPSS"
                },
                {
                    "category": "other",
                    "text": "4.6",
                    "title": "NCSC Score"
                },
                {
                    "category": "other",
                    "text": "There is product data available from source Certbundde, VENDOR FIX as product remediation category",
                    "title": "NCSC Score top increasing factors"
                },
                {
                    "category": "other",
                    "text": "The value of the most recent EPSS score, There is exploit data available from source Nvd",
                    "title": "NCSC Score top decreasing factors"
                },
                {
                    "category": "details",
                    "text": "Severity: 2\n",
                    "title": "Vendor assessment"
                }
            ],
            "product_status": {
                "fixed": [
                    "CSAFPID-5973090"
                ],
                "known_affected": [
                    "CSAFPID-5767903",
                    "CSAFPID-5767904",
                    "CSAFPID-5767905",
                    "CSAFPID-5767906",
                    "CSAFPID-1441150",
                    "CSAFPID-1508257",
                    "CSAFPID-1508265",
                    "CSAFPID-1508266",
                    "CSAFPID-4534155",
                    "CSAFPID-5449645",
                    "CSAFPID-5486263",
                    "CSAFPID-5486265",
                    "CSAFPID-5798480",
                    "CSAFPID-5798481",
                    "CSAFPID-5798482",
                    "CSAFPID-1384077",
                    "CSAFPID-5354794",
                    "CSAFPID-1317174",
                    "CSAFPID-1317175",
                    "CSAFPID-1330296"
                ],
                "known_not_affected": [
                    "CSAFPID-5973065",
                    "CSAFPID-5973066",
                    "CSAFPID-5973067",
                    "CSAFPID-5973068",
                    "CSAFPID-5973069",
                    "CSAFPID-5973070",
                    "CSAFPID-5973071",
                    "CSAFPID-5973072",
                    "CSAFPID-5973073",
                    "CSAFPID-5973074",
                    "CSAFPID-5973075",
                    "CSAFPID-5973076",
                    "CSAFPID-5973077",
                    "CSAFPID-5973078",
                    "CSAFPID-5973079",
                    "CSAFPID-5973080",
                    "CSAFPID-5973081",
                    "CSAFPID-5973082",
                    "CSAFPID-5973083",
                    "CSAFPID-5973084",
                    "CSAFPID-5973085",
                    "CSAFPID-5973086",
                    "CSAFPID-5973087",
                    "CSAFPID-5973088",
                    "CSAFPID-5973089",
                    "CSAFPID-5973091",
                    "CSAFPID-5973092",
                    "CSAFPID-5984227"
                ]
            },
            "references": [
                {
                    "category": "external",
                    "summary": "Source - github",
                    "url": "https://github.com/advisories/GHSA-46wh-pxpv-q5gq"
                },
                {
                    "category": "external",
                    "summary": "Source raw - github",
                    "url": "https://api.github.com/advisories/GHSA-46wh-pxpv-q5gq"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/npm%2FGHSA-46wh-pxpv-q5gq.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Source - cveprojectv5",
                    "url": "https://www.cve.org/CVERecord?id=CVE-2026-30827"
                },
                {
                    "category": "external",
                    "summary": "Source raw - cveprojectv5",
                    "url": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/30xxx/CVE-2026-30827.json"
                },
                {
                    "category": "external",
                    "summary": "Source - nvd",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-30827"
                },
                {
                    "category": "external",
                    "summary": "Source raw - nvd",
                    "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-30827"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-30827"
                },
                {
                    "category": "external",
                    "summary": "Source raw - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-30827"
                },
                {
                    "category": "external",
                    "summary": "Source raw - redhat",
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-30827.json"
                },
                {
                    "category": "external",
                    "summary": "Source - github",
                    "url": "https://api.github.com/advisories/GHSA-46wh-pxpv-q5gq"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - certbundde",
                    "url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0935.json"
                },
                {
                    "category": "external",
                    "summary": "Source - redhat",
                    "url": "https://access.redhat.com/hydra/rest/securitydata/csaf/RHSA-2026:6309.json"
                },
                {
                    "category": "external",
                    "summary": "Source - redhat",
                    "url": "https://access.redhat.com/hydra/rest/securitydata/csaf/RHSA-2026:6404.json"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; github; nvd; osv; redhat",
                    "url": "https://github.com/express-rate-limit/express-rate-limit/security/advisories/GHSA-46wh-pxpv-q5gq"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; github; nvd; osv; redhat",
                    "url": "https://github.com/express-rate-limit/express-rate-limit/commit/14e53888cdfd1b9798faf5b634c4206409e27fc4"
                },
                {
                    "category": "external",
                    "summary": "Reference - github",
                    "url": "https://github.com/advisories/GHSA-46wh-pxpv-q5gq"
                },
                {
                    "category": "external",
                    "summary": "Reference - github; osv; redhat",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-30827"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://www.cve.org/CVERecord?id=CVE-2026-30827"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0935.json"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0935"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://access.redhat.com/errata/RHSA-2026:6308"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde; redhat",
                    "url": "https://access.redhat.com/errata/RHSA-2026:6309"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-30827"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2445429"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-26007"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-25639"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2025-69223"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2025-69873"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-1615"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-28498"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-28802"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-29074"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-30922"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/updates/classification/"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://access.redhat.com/security/cve/CVE-2026-25990"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.6/html/release_notes/patch_releases"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6309.json"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde; redhat",
                    "url": "https://access.redhat.com/errata/RHSA-2026:6404"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://access.redhat.com/errata/RHSA-2026:6278"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3215.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - certbundde",
                    "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025088.html"
                },
                {
                    "category": "external",
                    "summary": "Reference - redhat",
                    "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6404.json"
                }
            ],
            "remediations": [
                {
                    "category": "mitigation",
                    "details": "Restrict network access to applications utilizing the express-rate-limit middleware to trusted clients or networks. Implementing firewall rules or network access controls can prevent untrusted actors from exploiting the shared rate-limit bucket vulnerability affecting IPv4-mapped IPv6 addresses on dual-stack servers.",
                    "product_ids": [
                        "CSAFPID-1441150",
                        "CSAFPID-1508257",
                        "CSAFPID-1508265",
                        "CSAFPID-1508266",
                        "CSAFPID-4534155",
                        "CSAFPID-5449645",
                        "CSAFPID-5486263",
                        "CSAFPID-5486265"
                    ]
                },
                {
                    "category": "vendor_fix",
                    "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.6#Upgrade",
                    "product_ids": [
                        "CSAFPID-5153949",
                        "CSAFPID-5973090"
                    ],
                    "restart_required": {
                        "category": "none"
                    },
                    "url": "https://access.redhat.com/errata/RHSA-2026:6309"
                },
                {
                    "category": "workaround",
                    "details": "Restrict network access to applications utilizing the express-rate-limit middleware to trusted clients or networks. Implementing firewall rules or network access controls can prevent untrusted actors from exploiting the shared rate-limit bucket vulnerability affecting IPv4-mapped IPv6 addresses on dual-stack servers.",
                    "product_ids": [
                        "CSAFPID-5153949",
                        "CSAFPID-5973065",
                        "CSAFPID-5973066",
                        "CSAFPID-5973067",
                        "CSAFPID-5973068",
                        "CSAFPID-5973069",
                        "CSAFPID-5973070",
                        "CSAFPID-5973071",
                        "CSAFPID-5973072",
                        "CSAFPID-5973073",
                        "CSAFPID-5973074",
                        "CSAFPID-5973075",
                        "CSAFPID-5973076",
                        "CSAFPID-5973077",
                        "CSAFPID-5973078",
                        "CSAFPID-5973079",
                        "CSAFPID-5973080",
                        "CSAFPID-5973081",
                        "CSAFPID-5973082",
                        "CSAFPID-5973083",
                        "CSAFPID-5973084",
                        "CSAFPID-5973085",
                        "CSAFPID-5973086",
                        "CSAFPID-5973087",
                        "CSAFPID-5973088",
                        "CSAFPID-5973089",
                        "CSAFPID-5973090",
                        "CSAFPID-5973091",
                        "CSAFPID-5973092",
                        "CSAFPID-5984227"
                    ]
                },
                {
                    "category": "vendor_fix",
                    "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\nFor details on how to apply this update, refer to:\nhttps://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.6#Upgrade",
                    "product_ids": [
                        "CSAFPID-5153949",
                        "CSAFPID-5973090"
                    ],
                    "restart_required": {
                        "category": "none"
                    },
                    "url": "https://access.redhat.com/errata/RHSA-2026:6404"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1317174",
                        "CSAFPID-1317175",
                        "CSAFPID-1330296",
                        "CSAFPID-1384077",
                        "CSAFPID-1441150",
                        "CSAFPID-1508257",
                        "CSAFPID-1508265",
                        "CSAFPID-1508266",
                        "CSAFPID-4534155",
                        "CSAFPID-5354794",
                        "CSAFPID-5449645",
                        "CSAFPID-5486263",
                        "CSAFPID-5486265",
                        "CSAFPID-5767903",
                        "CSAFPID-5767904",
                        "CSAFPID-5767905",
                        "CSAFPID-5767906",
                        "CSAFPID-5798480",
                        "CSAFPID-5798481",
                        "CSAFPID-5798482"
                    ]
                }
            ],
            "title": "CVE-2026-30827"
        }
    ]
}