-
Notifications
You must be signed in to change notification settings - Fork 0
Description
📂 Vulnerable Library - nxtp-utils-2.5.0-alpha.8.tgz
Common utilities for use within the @connext/nxtp-* packages
Path to dependency file: /package.json
Path to vulnerable library: /packages/utils/package.json
Partial results (27 findings) are displayed below due to a content size limitation in GitHub. To view information on the remaining findings, navigate to the Mend Application.
Findings
| Finding | Severity | 🎯 CVSS | Exploit Maturity | EPSS | Library | Type | Fixed in | Remediation Available | Reachability |
|---|---|---|---|---|---|---|---|---|---|
| CVE-2025-6545 | 🟣 Critical | 10.0 | Not Defined | < 1% | pbkdf2-3.1.2.tgz | Transitive | N/A | ❌ | |
| CVE-2023-46233 | 🟣 Critical | 9.1 | Not Defined | < 1% | crypto-js-3.3.0.tgz | Transitive | N/A | ❌ | |
| CVE-2024-48949 | 🟣 Critical | 9.1 | Not Defined | < 1% | elliptic-6.5.5.tgz | Transitive | N/A | ❌ | |
| CVE-2026-23950 | 🔴 High | 8.8 | Not Defined | < 1% | tar-4.4.19.tgz | Transitive | N/A | ❌ | |
| CVE-2026-23950 | 🔴 High | 8.8 | Not Defined | < 1% | tar-6.2.0.tgz | Transitive | N/A | ❌ | |
| CVE-2025-7783 | 🔴 High | 8.7 | Not Defined | < 1% | form-data-2.3.3.tgz | Transitive | N/A | ❌ | |
| CVE-2025-9287 | 🔴 High | 8.7 | Not Defined | < 1% | cipher-base-1.0.4.tgz | Transitive | N/A | ❌ | |
| CVE-2025-9288 | 🔴 High | 8.7 | Not Defined | < 1% | sha.js-2.4.11.tgz | Transitive | N/A | ❌ | |
| WS-2025-0006 | 🔴 High | 8.6 | N/A | N/A | elliptic-6.5.5.tgz | Transitive | N/A | ❌ | |
| CVE-2026-24842 | 🔴 High | 8.2 | Not Defined | < 1% | tar-6.2.0.tgz | Transitive | N/A | ❌ | |
| CVE-2026-24842 | 🔴 High | 8.2 | Not Defined | < 1% | tar-4.4.19.tgz | Transitive | N/A | ❌ | |
| CVE-2024-21505 | 🔴 High | 7.5 | Proof of concept | < 1% | web3-utils-1.10.4.tgz | Transitive | N/A | ❌ | |
| CVE-2024-21538 | 🔴 High | 7.5 | Proof of concept | < 1% | cross-spawn-7.0.3.tgz | Transitive | N/A | ❌ | |
| CVE-2024-37890 | 🔴 High | 7.5 | Not Defined | < 1% | ws-3.3.3.tgz | Transitive | N/A | ❌ | |
| CVE-2024-45296 | 🔴 High | 7.5 | Not Defined | < 1% | path-to-regexp-0.1.7.tgz | Transitive | N/A | ❌ | |
| CVE-2024-45590 | 🔴 High | 7.5 | Not Defined | 1.5% | body-parser-1.20.2.tgz | Transitive | N/A | ❌ | |
| CVE-2024-48930 | 🔴 High | 7.5 | Not Defined | < 1% | secp256k1-4.0.3.tgz | Transitive | N/A | ❌ | |
| CVE-2024-52798 | 🔴 High | 7.5 | Not Defined | < 1% | path-to-regexp-0.1.7.tgz | Transitive | N/A | ❌ | |
| CVE-2025-27152 | 🔴 High | 7.5 | Not Defined | < 1% | axios-1.3.3.tgz | Transitive | N/A | ❌ | |
| CVE-2025-27611 | 🔴 High | 7.5 | Not Defined | < 1% | base-x-3.0.9.tgz | Transitive | N/A | ❌ | |
| CVE-2025-57330 | 🔴 High | 7.5 | Not Defined | < 1% | web3-core-subscriptions-1.10.4.tgz | Transitive | N/A | ❌ | |
| CVE-2025-58754 | 🔴 High | 7.5 | Not Defined | < 1% | axios-1.3.3.tgz | Transitive | N/A | ❌ | |
| CVE-2025-64756 | 🔴 High | 7.5 | Not Defined | < 1% | glob-10.3.10.tgz | Transitive | N/A | ❌ | |
| CVE-2026-25639 | 🔴 High | 7.5 | Not Defined | < 1% | axios-1.3.3.tgz | Transitive | N/A | ❌ | |
| CVE-2026-26996 | 🔴 High | 7.5 | Not Defined | < 1% | minimatch-9.0.3.tgz | Transitive | N/A | ❌ | |
| CVE-2026-27903 | 🔴 High | 7.5 | Not Defined | < 1% | minimatch-9.0.3.tgz | Transitive | N/A | ❌ | |
| CVE-2026-27904 | 🔴 High | 7.5 | Not Defined | < 1% | minimatch-9.0.3.tgz | Transitive | N/A | ❌ |
Details
🟣CVE-2025-6545
Vulnerable Library - pbkdf2-3.1.2.tgz
This library provides the functionality of PBKDF2 with the ability to use any supported hashing algorithm returned from crypto.getHashes()
Library home page: https://registry.npmjs.org/pbkdf2/-/pbkdf2-3.1.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
- nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-3.8.2.tgz
- ethereumjs-util-7.1.5.tgz
- ethereum-cryptography-0.1.3.tgz
- ❌ pbkdf2-3.1.2.tgz (Vulnerable Library)
- ethereum-cryptography-0.1.3.tgz
- ethereumjs-util-7.1.5.tgz
- maticjs-3.8.2.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Improper Input Validation vulnerability in pbkdf2 allows Signature Spoofing by Improper Validation. This vulnerability is associated with program files lib/to-buffer.Js.
This issue affects pbkdf2: from 3.0.10 through 3.1.2.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jun 23, 2025 06:41 PM
URL: CVE-2025-6545
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 10.0
Suggested Fix
Type: Upgrade version
Origin: GHSA-h7cp-r72f-jxh6
Release Date: Jun 23, 2025 06:41 PM
Fix Resolution : pbkdf2 - 3.1.3,https://github.com/browserify/pbkdf2.git - v3.1.3
🟣CVE-2023-46233
Vulnerable Library - crypto-js-3.3.0.tgz
JavaScript library of crypto standards.
Library home page: https://registry.npmjs.org/crypto-js/-/crypto-js-3.3.0.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- merkletreejs-0.3.9.tgz
- ❌ crypto-js-3.3.0.tgz (Vulnerable Library)
- merkletreejs-0.3.9.tgz
-
@connext/lighthouse-2.0.0.tgz (Root Library)
- sdk-1.0.0.tgz
- merkletreejs-0.2.32.tgz
- ❌ crypto-js-3.3.0.tgz (Vulnerable Library)
- merkletreejs-0.2.32.tgz
- sdk-1.0.0.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations.
Publish Date: Oct 25, 2023 08:49 PM
URL: CVE-2023-46233
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.1
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-46233
Release Date: Oct 25, 2023 08:49 PM
Fix Resolution : crypto-js - 4.2.0
🟣CVE-2024-48949
Vulnerable Library - elliptic-6.5.5.tgz
Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.5.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-bzz-1.10.4.tgz
- swarm-js-0.1.42.tgz
- eth-lib-0.1.29.tgz
- ❌ elliptic-6.5.5.tgz (Vulnerable Library)
- eth-lib-0.1.29.tgz
- swarm-js-0.1.42.tgz
- web3-bzz-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
-
@connext/bridge-reference-0.0.1.tgz (Root Library)
- wallet-sdk-3.5.4.tgz
- eth-json-rpc-filters-4.2.2.tgz
- eth-json-rpc-middleware-6.0.0.tgz
- ethereumjs-util-5.2.1.tgz
- ❌ elliptic-6.5.5.tgz (Vulnerable Library)
- ethereumjs-util-5.2.1.tgz
- eth-json-rpc-middleware-6.0.0.tgz
- eth-json-rpc-filters-4.2.2.tgz
- wallet-sdk-3.5.4.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits "sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()" validation.
Publish Date: Oct 10, 2024 12:00 AM
URL: CVE-2024-48949
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 9.1
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-48949
Release Date: Oct 10, 2024 12:00 AM
Fix Resolution : elliptic - 6.5.6
🔴CVE-2026-23950
Vulnerable Library - tar-4.4.19.tgz
tar for node
Library home page: https://registry.npmjs.org/tar/-/tar-4.4.19.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
- nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-bzz-1.10.4.tgz
- swarm-js-0.1.42.tgz
- ❌ tar-4.4.19.tgz (Vulnerable Library)
- swarm-js-0.1.42.tgz
- web3-bzz-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the "path-reservations" system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., "ß" and "ss"), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a "PathReservations" system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using "NFD" Unicode normalization (in which "ß" and "ss" are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which "ß" causes an inode collision with "ss")). This enables an attacker to circumvent internal parallelization locks ("PathReservations") using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates "path-reservations.js" to use a normalization form that matches the target filesystem's behavior (e.g., "NFKD"), followed by first "toLocaleLowerCase('en')" and then "toLocaleUpperCase('en')". As a workaround, users who cannot upgrade promptly, and who are programmatically using "node-tar" to extract arbitrary tarball data should filter out all "SymbolicLink" entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.
Publish Date: Jan 20, 2026 12:40 AM
URL: CVE-2026-23950
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-r6q2-hw4h-h46w
Release Date: Jan 20, 2026 12:40 AM
Fix Resolution : https://github.com/isaacs/node-tar.git - v7.5.4,tar - 7.5.4
🔴CVE-2026-23950
Vulnerable Library - tar-6.2.0.tgz
Library home page: https://registry.npmjs.org/tar/-/tar-6.2.0.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
- nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- secp256k1-4.0.3.tgz
- node-gyp-10.0.1.tgz
- make-fetch-happen-13.0.0.tgz
- cacache-18.0.2.tgz
- ❌ tar-6.2.0.tgz (Vulnerable Library)
- cacache-18.0.2.tgz
- make-fetch-happen-13.0.0.tgz
- node-gyp-10.0.1.tgz
- secp256k1-4.0.3.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the "path-reservations" system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., "ß" and "ss"), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a "PathReservations" system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using "NFD" Unicode normalization (in which "ß" and "ss" are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which "ß" causes an inode collision with "ss")). This enables an attacker to circumvent internal parallelization locks ("PathReservations") using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates "path-reservations.js" to use a normalization form that matches the target filesystem's behavior (e.g., "NFKD"), followed by first "toLocaleLowerCase('en')" and then "toLocaleUpperCase('en')". As a workaround, users who cannot upgrade promptly, and who are programmatically using "node-tar" to extract arbitrary tarball data should filter out all "SymbolicLink" entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.
Publish Date: Jan 20, 2026 12:40 AM
URL: CVE-2026-23950
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.8
Suggested Fix
Type: Upgrade version
Origin: GHSA-r6q2-hw4h-h46w
Release Date: Jan 20, 2026 12:40 AM
Fix Resolution : https://github.com/isaacs/node-tar.git - v7.5.4,tar - 7.5.4
🔴CVE-2025-7783
Vulnerable Library - form-data-2.3.3.tgz
A library to create readable "multipart/form-data" streams. Can be used to submit forms and file uploads to other web applications.
Library home page: https://registry.npmjs.org/form-data/-/form-data-2.3.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-bzz-1.10.4.tgz
- swarm-js-0.1.42.tgz
- eth-lib-0.1.29.tgz
- servify-0.1.12.tgz
- request-2.88.2.tgz
- ❌ form-data-2.3.3.tgz (Vulnerable Library)
- request-2.88.2.tgz
- servify-0.1.12.tgz
- eth-lib-0.1.29.tgz
- swarm-js-0.1.42.tgz
- web3-bzz-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
-
@connext/bridge-reference-0.0.1.tgz (Root Library)
- web3-provider-1.8.0.tgz
- web3-provider-engine-16.0.1.tgz
- request-2.88.2.tgz
- ❌ form-data-2.3.3.tgz (Vulnerable Library)
- request-2.88.2.tgz
- web3-provider-engine-16.0.1.tgz
- web3-provider-1.8.0.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js.
This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Jul 18, 2025 04:34 PM
URL: CVE-2025-7783
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-fjxv-7rqg-78g4
Release Date: Jul 18, 2025 04:34 PM
Fix Resolution : form-data - 2.5.4,form-data - 3.0.4,https://github.com/form-data/form-data.git - v2.5.4,form-data - 4.0.4,https://github.com/form-data/form-data.git - v4.0.4,https://github.com/form-data/form-data.git - v3.0.4
🔴CVE-2025-9287
Vulnerable Library - cipher-base-1.0.4.tgz
abstract base class for crypto-streams
Library home page: https://registry.npmjs.org/cipher-base/-/cipher-base-1.0.4.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
- nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-3.8.2.tgz
- ethereumjs-util-7.1.5.tgz
- create-hash-1.2.0.tgz
- ❌ cipher-base-1.0.4.tgz (Vulnerable Library)
- create-hash-1.2.0.tgz
- ethereumjs-util-7.1.5.tgz
- maticjs-3.8.2.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Improper Input Validation vulnerability in cipher-base allows Input Data Manipulation.This issue affects cipher-base: through 1.0.4.
Publish Date: Aug 20, 2025 09:43 PM
URL: CVE-2025-9287
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: GHSA-cpq7-6gpm-g9rc
Release Date: Aug 20, 2025 09:43 PM
Fix Resolution : cipher-base - 1.0.4
🔴CVE-2025-9288
Vulnerable Library - sha.js-2.4.11.tgz
Streamable SHA hashes in pure javascript
Library home page: https://registry.npmjs.org/sha.js/-/sha.js-2.4.11.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-3.8.2.tgz
- ethereumjs-util-7.1.5.tgz
- create-hash-1.2.0.tgz
- ❌ sha.js-2.4.11.tgz (Vulnerable Library)
- create-hash-1.2.0.tgz
- ethereumjs-util-7.1.5.tgz
- maticjs-3.8.2.tgz
-
@connext/bridge-reference-0.0.1.tgz (Root Library)
- wallet-sdk-3.5.4.tgz
- ❌ sha.js-2.4.11.tgz (Vulnerable Library)
- wallet-sdk-3.5.4.tgz
-
@connext/lighthouse-2.0.0.tgz (Root Library)
- linea-sdk-0.3.0.tgz
- typeorm-0.3.20.tgz
- ❌ sha.js-2.4.11.tgz (Vulnerable Library)
- typeorm-0.3.20.tgz
- linea-sdk-0.3.0.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Improper Input Validation vulnerability in sha.js allows Input Data Manipulation.This issue affects sha.js: through 2.4.11.
Publish Date: Aug 20, 2025 09:59 PM
URL: CVE-2025-9288
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.7
Suggested Fix
Type: Upgrade version
Origin: browserify/sha.js@f2a258e
Release Date: Aug 20, 2025 09:59 PM
Fix Resolution : https://github.com/browserify/sha.js.git - v2.4.12,sha.js - 2.4.12
🔴WS-2025-0006
Vulnerable Library - elliptic-6.5.5.tgz
Library home page: https://registry.npmjs.org/elliptic/-/elliptic-6.5.5.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-bzz-1.10.4.tgz
- swarm-js-0.1.42.tgz
- eth-lib-0.1.29.tgz
- ❌ elliptic-6.5.5.tgz (Vulnerable Library)
- eth-lib-0.1.29.tgz
- swarm-js-0.1.42.tgz
- web3-bzz-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
-
@connext/bridge-reference-0.0.1.tgz (Root Library)
- wallet-sdk-3.5.4.tgz
- eth-json-rpc-filters-4.2.2.tgz
- eth-json-rpc-middleware-6.0.0.tgz
- ethereumjs-util-5.2.1.tgz
- ❌ elliptic-6.5.5.tgz (Vulnerable Library)
- ethereumjs-util-5.2.1.tgz
- eth-json-rpc-middleware-6.0.0.tgz
- eth-json-rpc-filters-4.2.2.tgz
- wallet-sdk-3.5.4.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Summary Private key can be extracted from ECDSA signature upon signing a malformed input (e.g. a string or a number), which could e.g. come from JSON network input Note that "elliptic" by design accepts hex strings as one of the possible input types Details In this code: https://github.com/indutny/elliptic/blob/3e46a48fdd2ef2f89593e5e058d85530578c9761/lib/elliptic/ec/index.js#L100-L107 "msg" is a BN instance after conversion, but "nonce" is an array, and different BN instances could generate equivalent arrays after conversion. Meaning that a same "nonce" could be generated for different messages used in signing process, leading to "k" reuse, leading to private key extraction from a pair of signatures Such a message can be constructed for any already known message/signature pair, meaning that the attack needs only a single malicious message being signed for a full key extraction While signing unverified attacker-controlled messages would be problematic itself (and exploitation of this needs such a scenario), signing a single message still should not leak the private key Also, message validation could have the same bug (out of scope for this report, but could be possible in some situations), which makes this attack more likely when used in a chain PoC "k" reuse example import elliptic from 'elliptic' const { ec: EC } = elliptic const privateKey = crypto.getRandomValues(new Uint8Array(32)) const curve = 'ed25519' // or any other curve, e.g. secp256k1 const ec = new EC(curve) const prettyprint = ({ r, s }) => "r: ${r}, s: ${s}" const sig0 = prettyprint(ec.sign(Buffer.alloc(32, 1), privateKey)) // array of ones const sig1 = prettyprint(ec.sign('01'.repeat(32), privateKey)) // same message in hex form const sig2 = prettyprint(ec.sign('-' + '01'.repeat(32), privateKey)) // same "r", different "s" console.log({ sig0, sig1, sig2 }) Full attack This doesn't include code for generation/recovery on a purpose (bit it's rather trivial) import elliptic from 'elliptic' const { ec: EC } = elliptic const privateKey = crypto.getRandomValues(new Uint8Array(32)) const curve = 'secp256k1' // or any other curve, e.g. ed25519 const ec = new EC(curve) // Any message, e.g. previously known signature const msg0 = crypto.getRandomValues(new Uint8Array(32)) const sig0 = ec.sign(msg0, privateKey) // Attack const msg1 = funny(msg0) // this is a string here, but can also be of other non-Uint8Array types const sig1 = ec.sign(msg1, privateKey) const something = extract(msg0, sig0, sig1, curve) console.log('Curve:', curve) console.log('Typeof:', typeof msg1) console.log('Keys equal?', Buffer.from(privateKey).toString('hex') === something) const rnd = crypto.getRandomValues(new Uint8Array(32)) const st = (x) => JSON.stringify(x) console.log('Keys equivalent?', st(ec.sign(rnd, something).toDER()) === st(ec.sign(rnd, privateKey).toDER())) console.log('Orig key:', Buffer.from(privateKey).toString('hex')) console.log('Restored:', something) Output: Curve: secp256k1 Typeof: string Keys equal? true Keys equivalent? true Orig key: c7870f7eb3e8fd5155d5c8cdfca61aa993eed1fbe5b41feef69a68303248c22a Restored: c7870f7eb3e8fd5155d5c8cdfca61aa993eed1fbe5b41feef69a68303248c22a Similar for "ed25519", but due to low "n", the key might not match precisely but is nevertheless equivalent for signing: Curve: ed25519 Typeof: string Keys equal? false Keys equivalent? true Orig key: f1ce0e4395592f4de24f6423099e022925ad5d2d7039b614aaffdbb194a0d189 Restored: 01ce0e4395592f4de24f6423099e0227ec9cb921e3b7858581ec0d26223966a6 "restored" is equal to "orig" mod "N". Impact Full private key extraction when signing a single malicious message (that passes "JSON.stringify"/"JSON.parse")
Publish Date: Feb 11, 2025 10:00 PM
URL: WS-2025-0006
Threat Assessment
Exploit Maturity:N/A
EPSS:N/A
Score: 8.6
Suggested Fix
Type: Upgrade version
Origin: GHSA-vjh7-7g9h-fjfh
Release Date: Feb 11, 2025 10:00 PM
Fix Resolution : elliptic - 6.6.1,elliptic - 6.6.1
🔴CVE-2026-24842
Vulnerable Library - tar-6.2.0.tgz
Library home page: https://registry.npmjs.org/tar/-/tar-6.2.0.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
- nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- secp256k1-4.0.3.tgz
- node-gyp-10.0.1.tgz
- make-fetch-happen-13.0.0.tgz
- cacache-18.0.2.tgz
- ❌ tar-6.2.0.tgz (Vulnerable Library)
- cacache-18.0.2.tgz
- make-fetch-happen-13.0.0.tgz
- node-gyp-10.0.1.tgz
- secp256k1-4.0.3.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
Publish Date: Jan 28, 2026 12:20 AM
URL: CVE-2026-24842
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.2
Suggested Fix
Type: Upgrade version
Origin: isaacs/node-tar@f4a7aa9
Release Date: Jan 28, 2026 12:20 AM
Fix Resolution : tar - 7.5.7,https://github.com/isaacs/node-tar.git - v7.5.7
🔴CVE-2026-24842
Vulnerable Library - tar-4.4.19.tgz
tar for node
Library home page: https://registry.npmjs.org/tar/-/tar-4.4.19.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
- nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-bzz-1.10.4.tgz
- swarm-js-0.1.42.tgz
- ❌ tar-4.4.19.tgz (Vulnerable Library)
- swarm-js-0.1.42.tgz
- web3-bzz-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
Publish Date: Jan 28, 2026 12:20 AM
URL: CVE-2026-24842
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 8.2
Suggested Fix
Type: Upgrade version
Origin: isaacs/node-tar@f4a7aa9
Release Date: Jan 28, 2026 12:20 AM
Fix Resolution : tar - 7.5.7,https://github.com/isaacs/node-tar.git - v7.5.7
🔴CVE-2024-21505
Vulnerable Library - web3-utils-1.10.4.tgz
Library home page: https://registry.npmjs.org/web3-utils/-/web3-utils-1.10.4.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-net-1.10.4.tgz
- ❌ web3-utils-1.10.4.tgz (Vulnerable Library)
- web3-net-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
-
chain-abstraction-1.0.4.tgz (Root Library)
- sdk-1.11.1.tgz
- cow-sdk-1.0.2-RC.7.tgz
- paraswap-5.2.0.tgz
- web3-1.10.4.tgz
- ❌ web3-utils-1.10.4.tgz (Vulnerable Library)
- web3-1.10.4.tgz
- paraswap-5.2.0.tgz
- cow-sdk-1.0.2-RC.7.tgz
- sdk-1.11.1.tgz
-
@connext/lighthouse-2.0.0.tgz (Root Library)
- sdk-1.0.0.tgz
- merkletreejs-0.2.32.tgz
- ❌ web3-utils-1.10.4.tgz (Vulnerable Library)
- merkletreejs-0.2.32.tgz
- sdk-1.0.0.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge.
An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions.
Publish Date: Mar 25, 2024 05:00 AM
URL: CVE-2024-21505
Threat Assessment
Exploit Maturity:Proof of concept
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2024-21538
Vulnerable Library - cross-spawn-7.0.3.tgz
Cross platform child_process#spawn and child_process#spawnSync
Library home page: https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
- nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- secp256k1-4.0.3.tgz
- node-gyp-10.0.1.tgz
- glob-10.3.10.tgz
- foreground-child-3.1.1.tgz
- ❌ cross-spawn-7.0.3.tgz (Vulnerable Library)
- foreground-child-3.1.1.tgz
- glob-10.3.10.tgz
- node-gyp-10.0.1.tgz
- secp256k1-4.0.3.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Versions of the package cross-spawn before 6.0.6, from 7.0.0 and before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.
Publish Date: Nov 08, 2024 05:00 AM
URL: CVE-2024-21538
Threat Assessment
Exploit Maturity:Proof of concept
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-21538
Release Date: Nov 08, 2024 05:00 AM
Fix Resolution : cross-spawn - 7.0.5,org.webjars.npm:cross-spawn:6.0.6,https://github.com/moxystudio/node-cross-spawn.git - v6.0.6,https://github.com/moxystudio/node-cross-spawn.git - v7.0.5,cross-spawn - 7.0.5,cross-spawn - 6.0.6
🔴CVE-2024-37890
Vulnerable Library - ws-3.3.3.tgz
Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js
Library home page: https://registry.npmjs.org/ws/-/ws-3.3.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
- nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-bzz-1.10.4.tgz
- swarm-js-0.1.42.tgz
- eth-lib-0.1.29.tgz
- ❌ ws-3.3.3.tgz (Vulnerable Library)
- eth-lib-0.1.29.tgz
- swarm-js-0.1.42.tgz
- web3-bzz-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.
Publish Date: Jun 17, 2024 07:09 PM
URL: CVE-2024-37890
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-3h5v-q93c-6h6q
Release Date: Jun 17, 2024 07:09 PM
Fix Resolution : ws - 5.2.4,6.2.3,7.5.10,8.17.1
🔴CVE-2024-45296
Vulnerable Library - path-to-regexp-0.1.7.tgz
Express style path to RegExp utility
Library home page: https://registry.npmjs.org/path-to-regexp/-/path-to-regexp-0.1.7.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-bzz-1.10.4.tgz
- swarm-js-0.1.42.tgz
- eth-lib-0.1.29.tgz
- servify-0.1.12.tgz
- express-4.18.3.tgz
- ❌ path-to-regexp-0.1.7.tgz (Vulnerable Library)
- express-4.18.3.tgz
- servify-0.1.12.tgz
- eth-lib-0.1.29.tgz
- swarm-js-0.1.42.tgz
- web3-bzz-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
-
@connext/cartographer-poller-2.0.0.tgz (Root Library)
- dd-trace-3.13.2.tgz
- ❌ path-to-regexp-0.1.7.tgz (Vulnerable Library)
- dd-trace-3.13.2.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.
Publish Date: Sep 09, 2024 07:07 PM
URL: CVE-2024-45296
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-9wv6-86v2-598j
Release Date: Sep 09, 2024 07:07 PM
Fix Resolution : path-to-regexp - 0.1.10,1.9.0,3.3.0,6.3.0,8.0.0
🔴CVE-2024-45590
Vulnerable Library - body-parser-1.20.2.tgz
Library home page: https://registry.npmjs.org/body-parser/-/body-parser-1.20.2.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
- nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-bzz-1.10.4.tgz
- swarm-js-0.1.42.tgz
- eth-lib-0.1.29.tgz
- servify-0.1.12.tgz
- express-4.18.3.tgz
- ❌ body-parser-1.20.2.tgz (Vulnerable Library)
- express-4.18.3.tgz
- servify-0.1.12.tgz
- eth-lib-0.1.29.tgz
- swarm-js-0.1.42.tgz
- web3-bzz-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
body-parser is Node.js body parsing middleware. body-parser <1.20.3 is vulnerable to denial of service when url encoding is enabled. A malicious actor using a specially crafted payload could flood the server with a large number of requests, resulting in denial of service. This issue is patched in 1.20.3.
Publish Date: Sep 10, 2024 03:54 PM
URL: CVE-2024-45590
Threat Assessment
Exploit Maturity:Not Defined
EPSS:1.5%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-qwcr-r2fm-qrc7
Release Date: Sep 10, 2024 03:54 PM
Fix Resolution : body-parser - 1.20.3
🔴CVE-2024-48930
Vulnerable Library - secp256k1-4.0.3.tgz
This module provides native bindings to ecdsa secp256k1 functions
Library home page: https://registry.npmjs.org/secp256k1/-/secp256k1-4.0.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-3.8.2.tgz
- ethereumjs-util-7.1.5.tgz
- ethereum-cryptography-0.1.3.tgz
- ❌ secp256k1-4.0.3.tgz (Vulnerable Library)
- ethereum-cryptography-0.1.3.tgz
- ethereumjs-util-7.1.5.tgz
- maticjs-3.8.2.tgz
-
@connext/bridge-reference-0.0.1.tgz (Root Library)
- wallet-sdk-3.5.4.tgz
- web3.js-1.52.0.tgz
- ❌ secp256k1-4.0.3.tgz (Vulnerable Library)
- web3.js-1.52.0.tgz
- wallet-sdk-3.5.4.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
secp256k1-node is a Node.js binding for an Optimized C library for EC operations on curve secp256k1. In "elliptic"-based version, "loadUncompressedPublicKey" has a check that the public key is on the curve. Prior to versions 5.0.1, 4.0.4, and 3.8.1, however, "loadCompressedPublicKey" is missing that check. That allows the attacker to use public keys on low-cardinality curves to extract enough information to fully restore the private key from as little as 11 ECDH sessions, and very cheaply on compute power. Other operations on public keys are also affected, including e.g. "publicKeyVerify()" incorrectly returning "true" on those invalid keys, and e.g. "publicKeyTweakMul()" also returning predictable outcomes allowing to restore the tweak. Versions 5.0.1, 4.0.4, and 3.8.1 contain a fix for the issue.
Publish Date: Oct 21, 2024 03:41 PM
URL: CVE-2024-48930
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2024-52798
Vulnerable Library - path-to-regexp-0.1.7.tgz
Express style path to RegExp utility
Library home page: https://registry.npmjs.org/path-to-regexp/-/path-to-regexp-0.1.7.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-bzz-1.10.4.tgz
- swarm-js-0.1.42.tgz
- eth-lib-0.1.29.tgz
- servify-0.1.12.tgz
- express-4.18.3.tgz
- ❌ path-to-regexp-0.1.7.tgz (Vulnerable Library)
- express-4.18.3.tgz
- servify-0.1.12.tgz
- eth-lib-0.1.29.tgz
- swarm-js-0.1.42.tgz
- web3-bzz-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
-
@connext/cartographer-poller-2.0.0.tgz (Root Library)
- dd-trace-3.13.2.tgz
- ❌ path-to-regexp-0.1.7.tgz (Vulnerable Library)
- dd-trace-3.13.2.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of path-to-regexp. Upgrade to 0.1.12. This vulnerability exists because of an incomplete fix for CVE-2024-45296.
Publish Date: Dec 05, 2024 10:45 PM
URL: CVE-2024-52798
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-rhx6-c78j-4q9w
Release Date: Dec 05, 2024 10:45 PM
Fix Resolution : path-to-regexp - 0.1.12
🔴CVE-2025-27152
Vulnerable Library - axios-1.3.3.tgz
Library home page: https://registry.npmjs.org/axios/-/axios-1.3.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- ❌ axios-1.3.3.tgz (Vulnerable Library)
-
@connext/nxtp-integration-2.0.0.tgz (Root Library)
- ❌ axios-1.3.3.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
axios is a promise based HTTP client for the browser and node.js. The issue occurs when passing absolute URLs rather than protocol-relative URLs to axios. Even if baseURL is set, axios sends the request to the specified absolute URL, potentially causing SSRF and credential leakage. This issue impacts both server-side and client-side usage of axios. This issue is fixed in 1.8.2.
Publish Date: Mar 07, 2025 03:13 PM
URL: CVE-2025-27152
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-jr5f-v2jv-69x6
Release Date: Mar 07, 2025 03:13 PM
Fix Resolution : axios - 0.30.0,axios - 1.8.2,https://github.com/axios/axios.git - v0.30.0,org.webjars.npm:axios:1.8.3,https://github.com/axios/axios.git - v1.8.2
🔴CVE-2025-27611
Vulnerable Library - base-x-3.0.9.tgz
Fast base encoding / decoding of any given alphabet
Library home page: https://registry.npmjs.org/base-x/-/base-x-3.0.9.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-eth-1.10.4.tgz
- web3-eth-ens-1.10.4.tgz
- content-hash-2.5.2.tgz
- multihashes-0.4.21.tgz
- multibase-0.7.0.tgz
- ❌ base-x-3.0.9.tgz (Vulnerable Library)
- multibase-0.7.0.tgz
- multihashes-0.4.21.tgz
- content-hash-2.5.2.tgz
- web3-eth-ens-1.10.4.tgz
- web3-eth-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
-
@connext/bridge-reference-0.0.1.tgz (Root Library)
- wallet-sdk-3.5.4.tgz
- web3.js-1.52.0.tgz
- borsh-0.7.0.tgz
- bs58-4.0.1.tgz
- ❌ base-x-3.0.9.tgz (Vulnerable Library)
- bs58-4.0.1.tgz
- borsh-0.7.0.tgz
- web3.js-1.52.0.tgz
- wallet-sdk-3.5.4.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
base-x is a base encoder and decoder of any given alphabet using bitcoin style leading zero compression. Versions 4.0.0, 5.0.0, and all prior to 3.0.11, are vulnerable to attackers potentially deceiving users into sending funds to an unintended address. This issue has been patched in versions 3.0.11, 4.0.1, and 5.0.1.
Publish Date: Apr 30, 2025 07:36 PM
URL: CVE-2025-27611
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-xq7p-g2vc-g82p
Release Date: Apr 30, 2025 07:36 PM
Fix Resolution : base-x - 4.0.1,https://github.com/cryptocoinjs/base-x.git - v5.0.1,base-x - 5.0.1,base-x - 3.0.11,https://github.com/cryptocoinjs/base-x.git - v4.0.1,https://github.com/cryptocoinjs/base-x.git - v3.0.11
🔴CVE-2025-57330
Vulnerable Library - web3-core-subscriptions-1.10.4.tgz
Library home page: https://registry.npmjs.org/web3-core-subscriptions/-/web3-core-subscriptions-1.10.4.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
- nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- maticjs-web3-1.0.4.tgz
- web3-1.10.4.tgz
- web3-shh-1.10.4.tgz
- ❌ web3-core-subscriptions-1.10.4.tgz (Vulnerable Library)
- web3-shh-1.10.4.tgz
- web3-1.10.4.tgz
- maticjs-web3-1.0.4.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
The web3-core-subscriptions is a package designed to manages web3 subscriptions. A Prototype Pollution vulnerability in the attachToObject function of web3-core-subscriptions version 1.10.4 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.
Publish Date: Sep 24, 2025 12:00 AM
URL: CVE-2025-57330
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin:
Release Date:
Fix Resolution :
🔴CVE-2025-58754
Vulnerable Library - axios-1.3.3.tgz
Library home page: https://registry.npmjs.org/axios/-/axios-1.3.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- ❌ axios-1.3.3.tgz (Vulnerable Library)
-
@connext/nxtp-integration-2.0.0.tgz (Root Library)
- ❌ axios-1.3.3.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Axios is a promise based HTTP client for the browser and Node.js. When Axios starting in version 0.28.0 and prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the "data:" scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory ("Buffer"/"Blob") and returns a synthetic 200 response. This path ignores "maxContentLength" / "maxBodyLength" (which only protect HTTP responses), so an attacker can supply a very large "data:" URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested "responseType: 'stream'". Versions 0.30.2 and 1.12.0 contain a patch for the issue.
Publish Date: Sep 12, 2025 01:16 AM
URL: CVE-2025-58754
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-4hjh-wcwx-xvwj
Release Date: Sep 12, 2025 01:16 AM
Fix Resolution : https://github.com/axios/axios.git - v1.12.0,axios - 0.30.2,axios - 0.30.2,axios - 1.12.0,axios - 1.12.0
🔴CVE-2025-64756
Vulnerable Library - glob-10.3.10.tgz
Library home page: https://registry.npmjs.org/glob/-/glob-10.3.10.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- secp256k1-4.0.3.tgz
- node-gyp-10.0.1.tgz
- ❌ glob-10.3.10.tgz (Vulnerable Library)
- node-gyp-10.0.1.tgz
- secp256k1-4.0.3.tgz
-
@connext/nxtp-adapters-subgraph-2.5.0-alpha.7.tgz (Root Library)
- client-cli-3.0.0.tgz
- cli-0.82.35.tgz
- rimraf-5.0.5.tgz
- ❌ glob-10.3.10.tgz (Vulnerable Library)
- rimraf-5.0.5.tgz
- cli-0.82.35.tgz
- client-cli-3.0.0.tgz
-
@connext/lighthouse-2.0.0.tgz (Root Library)
- linea-sdk-0.3.0.tgz
- typeorm-0.3.20.tgz
- ❌ glob-10.3.10.tgz (Vulnerable Library)
- typeorm-0.3.20.tgz
- linea-sdk-0.3.0.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Glob matches files using patterns the shell uses. Starting in version 10.2.0 and prior to versions 10.5.0 and 11.1.0, the glob CLI contains a command injection vulnerability in its -c/--cmd option that allows arbitrary command execution when processing files with malicious names. When glob -c are used, matched filenames are passed to a shell with shell: true, enabling shell metacharacters in filenames to trigger command injection and achieve arbitrary code execution under the user or CI account privileges. This issue has been patched in versions 10.5.0 and 11.1.0.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Nov 17, 2025 05:29 PM
URL: CVE-2025-64756
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-5j98-mcp5-4vw2
Release Date: Nov 17, 2025 05:29 PM
Fix Resolution : glob - 11.1.0,https://github.com/isaacs/node-glob.git - v11.1.0,glob - 10.5.0,https://github.com/isaacs/node-glob.git - v10.5.0
🔴CVE-2026-25639
Vulnerable Library - axios-1.3.3.tgz
Library home page: https://registry.npmjs.org/axios/-/axios-1.3.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- ❌ axios-1.3.3.tgz (Vulnerable Library)
-
@connext/nxtp-integration-2.0.0.tgz (Root Library)
- ❌ axios-1.3.3.tgz (Vulnerable Library)
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
Axios is a promise based HTTP client for the browser and Node.js. Prior to versions 0.30.3 and 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing proto as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service. This vulnerability is fixed in versions 0.30.3 and 1.13.5.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Feb 09, 2026 08:11 PM
URL: CVE-2026-25639
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: axios/axios@28c7215
Release Date: Feb 09, 2026 08:11 PM
Fix Resolution : https://github.com/axios/axios.git - v1.13.5
🔴CVE-2026-26996
Vulnerable Library - minimatch-9.0.3.tgz
Library home page: https://registry.npmjs.org/minimatch/-/minimatch-9.0.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- secp256k1-4.0.3.tgz
- node-gyp-10.0.1.tgz
- glob-10.3.10.tgz
- ❌ minimatch-9.0.3.tgz (Vulnerable Library)
- glob-10.3.10.tgz
- node-gyp-10.0.1.tgz
- secp256k1-4.0.3.tgz
-
@connext/nxtp-adapters-subgraph-2.5.0-alpha.7.tgz (Root Library)
- client-cli-3.0.0.tgz
- cli-0.82.35.tgz
- rimraf-5.0.5.tgz
- glob-10.3.10.tgz
- ❌ minimatch-9.0.3.tgz (Vulnerable Library)
- glob-10.3.10.tgz
- rimraf-5.0.5.tgz
- cli-0.82.35.tgz
- client-cli-3.0.0.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions prior to 10.2.1, 3.1.3, 4.2.4, 5.1.7, 6.2.1, 7.4.7, 8.0.5, and 9.0.6 are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS.
This issue has been fixed in versions 10.2.1, 3.1.3, 4.2.4, 5.1.7, 6.2.1, 7.4.7, 8.0.5, and 9.0.6.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: Feb 20, 2026 03:05 AM
URL: CVE-2026-26996
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-3ppc-4f35-3m26
Release Date: Feb 19, 2026 12:56 AM
Fix Resolution : https://github.com/isaacs/minimatch.git - v10.2.1,https://github.com/isaacs/minimatch.git - v5.1.7,https://github.com/isaacs/minimatch.git - v3.1.3,https://github.com/isaacs/minimatch.git - v8.0.5,https://github.com/isaacs/minimatch.git - v4.2.4,https://github.com/isaacs/minimatch.git - v9.0.6,https://github.com/isaacs/minimatch.git - v6.2.1,https://github.com/isaacs/minimatch.git - v7.4.7
🔴CVE-2026-27903
Vulnerable Library - minimatch-9.0.3.tgz
Library home page: https://registry.npmjs.org/minimatch/-/minimatch-9.0.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- secp256k1-4.0.3.tgz
- node-gyp-10.0.1.tgz
- glob-10.3.10.tgz
- ❌ minimatch-9.0.3.tgz (Vulnerable Library)
- glob-10.3.10.tgz
- node-gyp-10.0.1.tgz
- secp256k1-4.0.3.tgz
-
@connext/nxtp-adapters-subgraph-2.5.0-alpha.7.tgz (Root Library)
- client-cli-3.0.0.tgz
- cli-0.82.35.tgz
- rimraf-5.0.5.tgz
- glob-10.3.10.tgz
- ❌ minimatch-9.0.3.tgz (Vulnerable Library)
- glob-10.3.10.tgz
- rimraf-5.0.5.tgz
- cli-0.82.35.tgz
- client-cli-3.0.0.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3, "matchOne()" performs unbounded recursive backtracking when a glob pattern contains multiple non-adjacent "**" (GLOBSTAR) segments and the input path does not match. The time complexity is O(C(n, k)) -- binomial -- where "n" is the number of path segments and "k" is the number of globstars. With k=11 and n=30, a call to the default "minimatch()" API stalls for roughly 5 seconds. With k=13, it exceeds 15 seconds. No memoization or call budget exists to bound this behavior. Any application where an attacker can influence the glob pattern passed to "minimatch()" is vulnerable. The realistic attack surface includes build tools and task runners that accept user-supplied glob arguments (ESLint, Webpack, Rollup config), multi-tenant systems where one tenant configures glob-based rules that run in a shared process, admin or developer interfaces that accept ignore-rule or filter configuration as globs, and CI/CD pipelines that evaluate user-submitted config files containing glob patterns. An attacker who can place a crafted pattern into any of these paths can stall the Node.js event loop for tens of seconds per invocation. The pattern is 56 bytes for a 5-second stall and does not require authentication in contexts where pattern input is part of the feature. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3 fix the issue.
Publish Date: Feb 26, 2026 01:06 AM
URL: CVE-2026-27903
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-7r86-cg39-jmmj
Release Date: Feb 26, 2026 01:06 AM
Fix Resolution : https://github.com/isaacs/minimatch.git - v8.0.6,https://github.com/isaacs/minimatch.git - v6.2.2,https://github.com/isaacs/minimatch.git - v7.4.8,https://github.com/isaacs/minimatch.git - v9.0.7,https://github.com/isaacs/minimatch.git - v10.2.3,https://github.com/isaacs/minimatch.git - v4.2.5,https://github.com/isaacs/minimatch.git - v3.1.3,https://github.com/isaacs/minimatch.git - v5.1.8
🔴CVE-2026-27904
Vulnerable Library - minimatch-9.0.3.tgz
Library home page: https://registry.npmjs.org/minimatch/-/minimatch-9.0.3.tgz
Path to dependency file: /package.json
Dependency Hierarchy:
-
nxtp-utils-2.5.0-alpha.8.tgz (Root Library)
- secp256k1-4.0.3.tgz
- node-gyp-10.0.1.tgz
- glob-10.3.10.tgz
- ❌ minimatch-9.0.3.tgz (Vulnerable Library)
- glob-10.3.10.tgz
- node-gyp-10.0.1.tgz
- secp256k1-4.0.3.tgz
-
@connext/nxtp-adapters-subgraph-2.5.0-alpha.7.tgz (Root Library)
- client-cli-3.0.0.tgz
- cli-0.82.35.tgz
- rimraf-5.0.5.tgz
- glob-10.3.10.tgz
- ❌ minimatch-9.0.3.tgz (Vulnerable Library)
- glob-10.3.10.tgz
- rimraf-5.0.5.tgz
- cli-0.82.35.tgz
- client-cli-3.0.0.tgz
Reachability Analysis
The vulnerable code is unreachable
Vulnerability Details
minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4, nested "()" extglobs produce regexps with nested unbounded quantifiers (e.g. "(?:(?:a|b))"), which exhibit catastrophic backtracking in V8. With a 12-byte pattern "(((a|b)))" and an 18-byte non-matching input, "minimatch()" stalls for over 7 seconds. Adding a single nesting level or a few input characters pushes this to minutes. This is the most severe finding: it is triggered by the default "minimatch()" API with no special options, and the minimum viable pattern is only 12 bytes. The same issue affects "+()" extglobs equally. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4 fix the issue.
Publish Date: Feb 26, 2026 01:07 AM
URL: CVE-2026-27904
Threat Assessment
Exploit Maturity:Not Defined
EPSS:< 1%
Score: 7.5
Suggested Fix
Type: Upgrade version
Origin: GHSA-23c5-xmqv-rm74
Release Date: Feb 26, 2026 01:07 AM
Fix Resolution : minimatch - 10.2.3,minimatch - 8.0.6,minimatch - 4.2.5,minimatch - 7.4.8,minimatch - 6.2.2,minimatch - 9.0.7,minimatch - 5.1.8,minimatch - 3.1.4