CVE-2025-9288

Vulnerability

CVE-2025-9288

sha.js: Missing type checks leading to hash rewind and passing on crafted data

ecosystem: redhat:7, redhat:8, redhat:9

A vulnerability was found in sha.js, where the hashing implementation does not perform sufficient input type validation. The .update() function accepts arbitrary objects, including those with crafted length properties, which can alter the internal state machine of the hashing process. This flaw may result in unexpected behavior such as rewinding the hash state, producing inconsistent digest outputs, or entering invalid processing loops. The issue was introduced due to the reliance on JavaScript object coercion rules rather than enforcing strict buffer or string inputs.

References
severityI
Important

type: vendor

source: secalert@redhat.com

CVSS3.1
7.7HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H

AVNetwork
ACHigh
PRNone
UINone
SNot Changed
CLow
IHigh
AHigh

source: secalert@redhat.com

 CWE
CWE-20

Improper Input Validation

source: secalert@redhat.com

published: 2025-08-20 21:59:44

modified: 2025-09-01 06:43:45

Detection

redhat:7

OR

unfixedAffected

 

firefox

package type: source

type: version

tag: rhel-7-extras-including-unpatched:ea4d92b2-f08d-8201-dfcc-1897ad44b77a

redhat:8

OR

unfixedAffected

 

grafana

package type: source

type: version

tag: rhel-8-including-unpatched:0e04bc73-f78d-8230-a264-85acea86d3a2

redhat:9

OR

unfixedAffected

 

polkit

package type: source

type: version

tag: rhel-9-including-unpatched:387de2d1-c696-cc66-925c-3d9896624c8e

Data Sources

  • RedHat Enterprise Linux CSAF VEX

    redhat-vex

VulsFutureVuls|GitHub