Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-4759
Analyzed
More InfoOfficial Page
Source-report@snyk.io
View Known Exploited Vulnerability (KEV) details
Published At-16 May, 2025 | 05:15
Updated At-03 Jun, 2025 | 15:57

Versions of the package lockfile-lint-api before 5.9.2 are vulnerable to Incorrect Behavior Order: Early Validation via the resolved attribute of the package URL validation which can be bypassed by extending the package name allowing an attacker to install other npm packages than the intended one.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.05.5MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.18.3HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Type: Secondary
Version: 4.0
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 8.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CPE Matches

lirantal
lirantal
>>lockfile-lint-api>>Versions before 5.9.2(exclusive)
cpe:2.3:a:lirantal:lockfile-lint-api:*:*:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-179Secondaryreport@snyk.io
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: CWE-179
Type: Secondary
Source: report@snyk.io
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://gist.github.com/Xavier59/881aef04940970dc3e738dcbff64151freport@snyk.io
Exploit
https://github.com/lirantal/lockfile-lint/blob/89b5cad028df4d77bab2b73ac93bc61e392668ab/packages/lockfile-lint-api/src/validators/ValidatePackageNames.js%23L51-L63report@snyk.io
Broken Link
https://github.com/lirantal/lockfile-lint/commit/9e5305bd3e4f0c6acc0d23ec43eac2bd5303b4careport@snyk.io
Patch
https://github.com/lirantal/lockfile-lint/pull/204report@snyk.io
Patch
https://security.snyk.io/vuln/SNYK-JS-LOCKFILELINTAPI-10169587report@snyk.io
Third Party Advisory
Hyperlink: https://gist.github.com/Xavier59/881aef04940970dc3e738dcbff64151f
Source: report@snyk.io
Resource:
Exploit
Hyperlink: https://github.com/lirantal/lockfile-lint/blob/89b5cad028df4d77bab2b73ac93bc61e392668ab/packages/lockfile-lint-api/src/validators/ValidatePackageNames.js%23L51-L63
Source: report@snyk.io
Resource:
Broken Link
Hyperlink: https://github.com/lirantal/lockfile-lint/commit/9e5305bd3e4f0c6acc0d23ec43eac2bd5303b4ca
Source: report@snyk.io
Resource:
Patch
Hyperlink: https://github.com/lirantal/lockfile-lint/pull/204
Source: report@snyk.io
Resource:
Patch
Hyperlink: https://security.snyk.io/vuln/SNYK-JS-LOCKFILELINTAPI-10169587
Source: report@snyk.io
Resource:
Third Party Advisory
Change History
0Changes found

Details not found