CVE-2025-62495
BaseFortify
Publication date: 2025-10-16
Last updated on: 2025-10-29
Assigner: Google Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| quickjs_project | quickjs | to 2025-09-13 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-191 | The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an integer overflow in the QuickJS regular expression engine's bytecode buffer size handling. The bytecode size is stored as an unsigned 64-bit value but is incorrectly cast to a signed 32-bit integer in some functions. When the bytecode size exceeds the maximum positive value for a signed 32-bit integer, it wraps around to a negative number. This negative value is then used in offset calculations, causing out-of-bounds writes in memory, which can lead to memory corruption.
How can this vulnerability impact me? :
This vulnerability can lead to out-of-bounds memory writes, potentially causing memory corruption. This can be exploited to crash the application, execute arbitrary code, or escalate privileges, depending on the context in which the QuickJS engine is used.