A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
History

Thu, 02 Oct 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Validatorjs
Validatorjs validator.js
Vendors & Products Validatorjs
Validatorjs validator.js

Tue, 30 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 17:45:00 +0000

Type Values Removed Values Added
Description A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-09-30T00:00:00.000Z

Updated: 2025-09-30T19:36:11.737Z

Reserved: 2025-08-16T00:00:00.000Z

Link: CVE-2025-56200

cve-icon Vulnrichment

Updated: 2025-09-30T19:35:36.845Z

cve-icon NVD

Status : Received

Published: 2025-09-30T18:15:50.307

Modified: 2025-09-30T20:15:39.810

Link: CVE-2025-56200

cve-icon Redhat

No data.