CVE-2025-66031
BaseFortify
Publication date: 2025-11-26
Last updated on: 2025-12-06
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| digitalbazaar | forge | to 1.3.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-674 | The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Uncontrolled Recursion issue in the node-forge library (versions 1.3.1 and below). It allows remote, unauthenticated attackers to create deeply nested ASN.1 structures that cause the parser to recurse without limit. This unbounded recursion leads to stack exhaustion, resulting in a Denial-of-Service (DoS) when parsing untrusted DER inputs. The issue is fixed in version 1.3.2.
How can this vulnerability impact me? :
The vulnerability can cause a Denial-of-Service (DoS) condition by exhausting the stack during parsing of maliciously crafted ASN.1 data. This means an attacker can disrupt the availability of applications using vulnerable versions of node-forge by sending specially crafted inputs that crash or hang the service.
What immediate steps should I take to mitigate this vulnerability?
Update node-forge to version 1.3.2 or later, as this version contains the patch for the uncontrolled recursion vulnerability. Avoid parsing untrusted DER inputs with vulnerable versions until the update is applied.