Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ZAP JavaScript Engine Memory Leak Issue Impacts Active Scan Usage

Posted on January 28, 2026January 28, 2026 By CWS

The ZAP (Zed Assault Proxy) undertaking, a broadly used open-source net software safety scanner, has disclosed a vital reminiscence leak in its JavaScript engine.

This flaw, probably current for a while, now disrupts energetic scanning workflows following the introduction of a brand new JavaScript scan rule within the OpenAPI add-on.

Safety groups counting on ZAP for dynamic software safety testing (DAST) face potential denial-of-service-like circumstances throughout scans.

ZAP maintainers issued the alert on January 28, 2026, emphasizing pressing remediation efforts. The reminiscence leak manifests throughout energetic scans, the place the JavaScript engine fails to correctly deallocate sources, resulting in speedy reminiscence exhaustion.

This problem gained prominence after the OpenAPI add-on’s latest replace included the problematic JS scan rule, amplifying useful resource consumption in automated testing pipelines.

At its core, the vulnerability stems from inefficient reminiscence dealing with inside ZAP’s JavaScript engine, presumably tied to long-running script executions or unhandled rubbish assortment in scan guidelines.

We now have grow to be conscious of a reminiscence leak within the JavaScript engine. That has most likely been there for a while, however will now have an effect on anybody utilizing the energetic scan because of the addition of a brand new JS scan rule within the OpenAPI add-on. We’re engaged on a repair as a matter of urgency.— Zed Assault Proxy (@zaproxy) January 28, 2026

Energetic scans ZAP’s hallmark characteristic for probing net apps by way of automated assaults like SQL injection and XSS set off the leak when processing OpenAPI specs with embedded JavaScript logic.

Impacts embrace:

Crashes or hangs in scanning classes, halting vulnerability discovery.

Elevated useful resource utilization on scanning hosts, risking broader infrastructure pressure in CI/CD environments.

Delayed safety assessments for DevSecOps groups utilizing ZAP in Docker or standalone deployments.

The flaw doesn’t expose scanned purposes to exploits however undermines ZAP’s reliability as a safety software, doubtlessly delaying patch identification in production-like environments.

Mitigation and Launch Updates

To curb fast dangers, the OpenAPI add-on has been patched to disable the offending JS scan rule by default. Customers should replace to the newest model for this workaround. Nightly and weekly ZAP releases at the moment are accessible with the repair, alongside refreshed Docker photos for weekly and stay channels.

Launch TypeStatusUpdate AdviceNightlyUpdatedPull newest for testingWeeklyUpdatedRecommended for manufacturing scansDocker (Weekly/Dwell)UpdatedRebuild containers promptlyStablePendingMonitor for underlying repair

Builders ought to confirm installations by way of zaproxy –model and re-enable the rule solely post-root repair.

ZAP maintainers are prioritizing a everlasting decision to the JavaScript engine leak, with ongoing commits anticipated quickly. This incident underscores the challenges of integrating dynamic scripting in safety instruments, the place efficiency bugs can cascade into operational vulnerabilities.

Safety professionals are suggested to observe ZAP’s GitHub repository and bulletins for the steady launch. Within the interim, fallback to passive scans or various instruments like Burp Suite might bridge gaps.

Not too long ago he Zed Assault Proxy (ZAP) workforce has launched the OWASP PTK add-on, model 0.2.0 alpha, integrating the OWASP Penetration Testing Equipment (PTK) browser extension straight into ZAP-launched browsers.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Active, Engine, Impacts, Issue, JavaScript, Leak, Memory, Scan, Usage, ZAP

Post navigation

Previous Post: Check Point Harmony SASE Windows Client Vulnerability Enables Privilege Escalation
Next Post: Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

Related Posts

Beware of Free Video Game Cheats That Delivers Infostealer Malwares Cyber Security News
WordPress Theme RCE Vulnerability Actively Exploited to Take Full Site Control Cyber Security News
Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
UEFI Shell Vulnerabilities Could Allow Hackers to Bypass Secure Boot on 200,000+ Laptops Cyber Security News
Microsoft Outlook for Windows Bug Leads to Crash While Opening Email Cyber Security News
Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
  • Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links
  • TP-Link Archer Vulnerability Let Attackers Take Control Over the Router
  • Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
  • Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links
  • TP-Link Archer Vulnerability Let Attackers Take Control Over the Router
  • Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark