CVE-2025-12758
BaseFortify
Publication date: 2025-11-27
Last updated on: 2025-12-30
Assigner: Snyk
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| validator_project | validator | to 13.15.22 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-792 | The product receives data from an upstream component, but does not completely filter one or more instances of special elements before sending it to a downstream component. |
| CWE-172 | The product does not properly encode or decode the data, resulting in unexpected values. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in versions of the package validator before 13.15.22, where the isLength() function does not properly filter or account for Unicode variation selectors (\uFE0F, \uFE0E) in strings. This causes the function to miscalculate the string length, potentially allowing strings longer than intended to pass validation.
How can this vulnerability impact me? :
Because the isLength() function miscalculates string length, applications using it for input validation may accept strings significantly longer than expected. This can lead to issues such as data truncation in databases, buffer overflows in other system components, or denial-of-service conditions.