The vulnerability, identified as CVE-2025-13466, is a denial-of-service issue in the body-parser library for Node.js. It arises from the inefficient processing of URL-encoded request bodies that contain a very large number of parameters. The root cause of the vulnerability is located in the parameterCount function within the lib/types/urlencoded.js file. The original implementation of this function used body.split('&') to count the parameters. This method is highly inefficient for large request bodies with many parameters, as it results in the creation of a large array of strings, consuming excessive CPU and memory resources. This can be exploited by an attacker to cause a denial of service.\n\nThe provided patch, commit b204886a6744b0b6d297cd0e849d75de836f3b63, directly addresses this inefficiency. It replaces the split-based implementation with a more performant iterative approach that counts the occurrences of the '&' delimiter without creating a large intermediate array. This change mitigates the denial-of-service risk. Therefore, the parameterCount function is the specific location of the vulnerability.