CVE-2025-62492
BaseFortify
Publication date: 2025-10-16
Last updated on: 2025-10-30
Assigner: Google Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| quickjs_project | quickjs | to 2025-09-13 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is caused by floating-point arithmetic precision errors in the QuickJS engine's implementation of TypedArray.prototype.indexOf() when a negative fromIndex argument is used. Specifically, when the negative fromIndex is extremely close to zero (like -1e-20), adding it to the array length results in a loss of precision, causing the calculated starting index to be exactly equal to the array length. Since valid indices range from 0 to length-1, starting the search at the array length causes an out-of-bounds read of one element beyond the array.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to perform an out-of-bounds read of one element immediately following the buffer. Although the scope of this read is small, it can potentially lead to information disclosure of adjacent memory contents depending on the execution environment.