A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
Metrics
Affected Vendors & Products
References
History
Thu, 02 Oct 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Validatorjs
Validatorjs validator.js |
|
Vendors & Products |
Validatorjs
Validatorjs validator.js |
Tue, 30 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | |
Metrics |
cvssV3_1
|
Tue, 30 Sep 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-30T19:36:11.737Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-56200

Updated: 2025-09-30T19:35:36.845Z

Status : Received
Published: 2025-09-30T18:15:50.307
Modified: 2025-09-30T20:15:39.810
Link: CVE-2025-56200

No data.