Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Beware Fake Notepad++ for Mac Site Can Harm Your Machine
May 5, 2026
Critical Android Zero-Click Flaw Grants Remote Shell Access
May 5, 2026
pnpm 11 Turns On Minimum Release Age by Default to Reduce npm
May 5, 2026
Home/CyberSecurity News/ZAP JavaScript Engine Memory Leak Impacts Active Scan Usage
CyberSecurity News

ZAP JavaScript Engine Memory Leak Impacts Active Scan Usage

A critical memory leak has been disclosed in the JavaScript engine of the ZAP (Zed Attack Proxy) project, a widely used open-source web application security scanner. This flaw, likely present for...

Sarah simpson
Sarah simpson
January 28, 2026 2 Min Read
0 0

A critical memory leak has been disclosed in the JavaScript engine of the ZAP (Zed Attack Proxy) project, a widely used open-source web application security scanner.

This flaw, likely present for some time, now disrupts active scanning workflows following the introduction of a new JavaScript scan rule in the OpenAPI add-on.

Security teams relying on ZAP for dynamic application security testing (DAST) face potential denial-of-service-like conditions during scans.

ZAP maintainers issued the alert on January 28, 2026, emphasizing urgent remediation efforts. The memory leak manifests during active scans, where the JavaScript engine fails to properly deallocate resources, leading to rapid memory exhaustion.

This issue gained prominence after the OpenAPI add-on’s recent update incorporated the problematic JS scan rule, amplifying resource consumption in automated testing pipelines.

At its core, the vulnerability stems from inefficient memory handling within ZAP’s JavaScript engine, possibly tied to long-running script executions or unhandled garbage collection in scan rules.

We have become aware of a memory leak in the JavaScript engine.
That has probably been there for some time, but will now affect anyone using the active scan due to the addition of a new JS scan rule in the OpenAPI add-on.
We are working on a fix as a matter of urgency.

— Zed Attack Proxy (@zaproxy) January 28, 2026

Active scans ZAP’s hallmark feature for probing web apps via automated attacks like SQL injection and XSS trigger the leak when processing OpenAPI specifications with embedded JavaScript logic.

Impacts include:

  • Crashes or hangs in scanning sessions, halting vulnerability discovery.
  • Elevated resource usage on scanning hosts, risking broader infrastructure strain in CI/CD environments.
  • Delayed security assessments for DevSecOps teams using ZAP in Docker or standalone deployments.

The flaw does not expose scanned applications to exploits but undermines ZAP’s reliability as a security tool, potentially delaying patch identification in production-like environments.

Mitigation and Release Updates

To curb immediate risks, the OpenAPI add-on has been patched to disable the offending JS scan rule by default. Users must update to the latest version for this workaround. Nightly and weekly ZAP releases are now available with the fix, alongside refreshed Docker images for weekly and live channels.

Release Type Status Update Advice
Nightly Updated Pull latest for testing
Weekly Updated Recommended for production scans
Docker (Weekly/Live) Updated Rebuild containers promptly
Stable Pending Monitor for underlying fix

Developers should verify installations via zaproxy –version and re-enable the rule only post-root fix.

ZAP maintainers are prioritizing a permanent resolution to the JavaScript engine leak, with ongoing commits expected soon. This incident underscores the challenges of integrating dynamic scripting in security tools, where performance bugs can cascade into operational vulnerabilities.

Security professionals are advised to monitor ZAP’s GitHub repository and announcements for the stable release. In the interim, fallback to passive scans or alternative tools like Burp Suite may bridge gaps.

Recently he Zed Attack Proxy (ZAP) team has released the OWASP PTK add-on, version 0.2.0 alpha, integrating the OWASP Penetration Testing Kit (PTK) browser extension directly into ZAP-launched browsers.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitPatchSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Check Point Harmony SASE Windows Flaw Allows Client Vulnerability

Next Post

Threat Actors Use Enterprise Email Threads for Phishing Links

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DigiCert Hacked: EV Code Signing Certs St Weaponized Screensaver
May 4, 2026
Bluekit Phishing Kit Automates 2FA Lures Domains Session
May 4, 2026
New MicroStealer Malware Actively Targets Telecom Attacking Education
May 4, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us