CVE-2025-46653
JavaScript vulnerability analysis and mitigation

Overview

Formidable (aka node-formidable) versions 2.1.0 through 3.x before 3.5.3 contains a security vulnerability related to filename generation. The package relies on hexoid for generating filenames for untrusted executable content, but hexoid is documented as not being cryptographically secure. Additionally, there exists a scenario where only the last two characters of a hexoid string need to be guessed, though this is typically not relevant in most cases (NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 Base Score of 3.1 (LOW) with the following vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N. The issue is classified under CWE-338 (Use of Cryptographically Weak Pseudo-Random Number Generator). The vulnerability stems from the use of hexoid for filename generation, which is not cryptographically secure (NVD).

Impact

The impact of this vulnerability is considered low. While the vulnerability exists in the filename generation mechanism, it's important to note that in typical use cases, attackers will not be able to exploit the hexoid behavior to upload and execute their own content (NVD).

Mitigation and workarounds

The vulnerability has been patched in version 3.5.3 of Formidable. The fix involves switching from hexoid to cuid2 (using the @paralleldrive/cuid2 package) for generating random names, which provides better randomness and improved security while maintaining the 25-character length (Formidable Changelog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management