CVE-2025-10954
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-27

Last updated on: 2025-10-03

Assigner: Snyk

Description
Versions of the package github.com/nyaruka/phonenumbers before 1.2.2 are vulnerable to Improper Validation of Syntactic Correctness of Input in the phonenumbers.Parse() function. An attacker can cause a panic by providing crafted input causing a "runtime error: slice bounds out of range".
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-27
Last Modified
2025-10-03
Generated
2026-05-07
AI Q&A
2025-09-27
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
textit phonenumbers to 1.2.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1286 The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in versions of the package github.com/nyaruka/phonenumbers before 1.2.2. It is due to improper validation of the syntactic correctness of input in the phonenumbers.Parse() function. An attacker can exploit this by providing specially crafted input that causes a runtime error, specifically a "slice bounds out of range" panic.


How can this vulnerability impact me? :

The vulnerability can cause the application using the affected package to crash or panic due to a runtime error when processing crafted input. This can lead to denial of service conditions, impacting the availability of the application.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart