CVE-2025-66031
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-26

Last updated on: 2025-12-06

Assigner: GitHub, Inc.

Description
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-26
Last Modified
2025-12-06
Generated
2026-05-07
AI Q&A
2025-11-27
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
digitalbazaar forge to 1.3.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-674 The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Uncontrolled Recursion issue in the node-forge library (versions 1.3.1 and below). It allows remote, unauthenticated attackers to create deeply nested ASN.1 structures that cause the parser to recurse without limit. This unbounded recursion leads to stack exhaustion, resulting in a Denial-of-Service (DoS) when parsing untrusted DER inputs. The issue is fixed in version 1.3.2.


How can this vulnerability impact me? :

The vulnerability can cause a Denial-of-Service (DoS) condition by exhausting the stack during parsing of maliciously crafted ASN.1 data. This means an attacker can disrupt the availability of applications using vulnerable versions of node-forge by sending specially crafted inputs that crash or hang the service.


What immediate steps should I take to mitigate this vulnerability?

Update node-forge to version 1.3.2 or later, as this version contains the patch for the uncontrolled recursion vulnerability. Avoid parsing untrusted DER inputs with vulnerable versions until the update is applied.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart