-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2025-12758 - High Severity Vulnerability
Vulnerable Library - validator-13.15.20.tgz
String validation and sanitization
Library home page: https://registry.npmjs.org/validator/-/validator-13.15.20.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- ❌ validator-13.15.20.tgz (Vulnerable Library)
Found in base branch: csl
Vulnerability Details
Versions of the package validator before 13.15.22 are vulnerable to Incomplete Filtering of One or More Instances of Special Elements in the isLength() function that does not take into account Unicode variation selectors (\uFE0F, \uFE0E) appearing in a sequence which lead to improper string length calculation. This can lead to an application using isLength for input validation accepting strings significantly longer than intended, resulting in issues like data truncation in databases, buffer overflows in other system components, or denial-of-service.
Publish Date: 2025-11-27
URL: CVE-2025-12758
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
⛑️ Automatic Remediation will be attempted for this issue.