A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
References
| Link | Resource |
|---|---|
| http://validatorjs.com | Broken Link |
| https://gist.github.com/junan-98/27ae092aa40e2a057d41a0f95148f666 | Exploit Third Party Advisory |
| https://gist.github.com/junan-98/a93130505b258b9e4ec9f393e7533596 | Exploit Third Party Advisory |
| https://github.com/validatorjs/validator.js | Product |
Configurations
History
No history.
Information
Published : 2025-09-30 18:15
Updated : 2025-10-18 01:48
NVD link : CVE-2025-56200
Mitre link : CVE-2025-56200
CVE.ORG link : CVE-2025-56200
JSON object : View
Products Affected
validator_project
- validator
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
