CVE-2025-62494
BaseFortify
Publication date: 2025-10-16
Last updated on: 2025-10-29
Assigner: Google Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| quickjs_project | quickjs | to 2025-09-13 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-704 | The product does not correctly convert an object, resource, or structure from one type to a different type. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a type confusion issue in the QuickJS engine's string addition operation. When adding strings, the engine first checks if the left operand is a string, then converts the right operand to a primitive value, which can trigger a callback like toString or valueOf. During this callback, an attacker can change the type of the left operand in memory from a string to another type such as an object or array. The engine then continues to treat the left operand as a string, causing a mismatch between the assumed and actual types. This type confusion can lead to out-of-bounds memory access, memory corruption, and potentially arbitrary code execution within the QuickJS runtime.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute arbitrary code within the QuickJS runtime environment by exploiting the type confusion to cause memory corruption. This could lead to unauthorized actions, data manipulation, or system compromise depending on how QuickJS is used in your environment.