This flaw, likely present for some time, now disrupts active scanning workflows following the introduction of a new JavaScript scan rule in the OpenAPI add-on.
Security teams relying on ZAP for dynamic application security testing (DAST) face potential denial-of-service-like conditions during scans.
ZAP maintainers issued the alert on January 28, 2026, emphasizing urgent remediation efforts. The memory leak manifests during active scans, where the JavaScript engine fails to properly deallocate resources, leading to rapid memory exhaustion.
This issue gained prominence after the OpenAPI add-on’s recent update incorporated the problematic JS scan rule, amplifying resource consumption in automated testing pipelines.
At its core, the vulnerability stems from inefficient memory handling within ZAP’s JavaScript engine, possibly tied to long-running script executions or unhandled garbage collection in scan rules.
Active scans ZAP’s hallmark feature for probing web apps via automated attacks like SQL injection and XSS trigger the leak when processing OpenAPI specifications with embedded JavaScript logic.
Impacts include:
The flaw does not expose scanned applications to exploits but undermines ZAP’s reliability as a security tool, potentially delaying patch identification in production-like environments.
To curb immediate risks, the OpenAPI add-on has been patched to disable the offending JS scan rule by default. Users must update to the latest version for this workaround. Nightly and weekly ZAP releases are now available with the fix, alongside refreshed Docker images for weekly and live channels.
| Release Type | Status | Update Advice |
|---|---|---|
| Nightly | Updated | Pull latest for testing |
| Weekly | Updated | Recommended for production scans |
| Docker (Weekly/Live) | Updated | Rebuild containers promptly |
| Stable | Pending | Monitor for underlying fix |
Developers should verify installations via zaproxy –version and re-enable the rule only post-root fix.
ZAP maintainers are prioritizing a permanent resolution to the JavaScript engine leak, with ongoing commits expected soon. This incident underscores the challenges of integrating dynamic scripting in security tools, where performance bugs can cascade into operational vulnerabilities.
Security professionals are advised to monitor ZAP’s GitHub repository and announcements for the stable release. In the interim, fallback to passive scans or alternative tools like Burp Suite may bridge gaps.
Recently he Zed Attack Proxy (ZAP) team has released the OWASP PTK add-on, version 0.2.0 alpha, integrating the OWASP Penetration Testing Kit (PTK) browser extension directly into ZAP-launched browsers.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post ZAP JavaScript Engine Memory Leak Issue Impacts Active Scan Usage appeared first on Cyber Security News.
A series of intrusions in early 2026 in which threat actors compromised FortiGate Next-Generation Firewalls…
Amy Guimond, who grew up in Henniker, moved back to town a few years ago…
Town officials in Pembroke have learned from past mistakes. This year, when the wireless microphone…
A long-vacant house on Airport Road sustained major damage in a fire early Saturday morning.…
Amy Bogart has had enough of the state failing to adequately fund education programs, such…
By the time Kelly Bokhan came to Loudon’s town meeting, she felt her wallet was…
This website uses cookies.