CVE-2025-50864
JavaScript vulnerability analysis and mitigation

Overview

An Origin Validation Error in the elysia-cors library through version 1.3.0 allows attackers to bypass Cross-Origin Resource Sharing (CORS) restrictions. The vulnerability was discovered in August 2025 and assigned CVE-2025-50864 (NVD). The affected component is the CORS validation mechanism in the elysia-cors library, which is used for handling cross-origin requests in web applications.

Technical details

The vulnerability stems from improper validation of the supplied origin in the CORS policy implementation. The library incorrectly validates origins by checking if the supplied origin is a substring of any domain in the site's CORS policy, rather than performing an exact match. For example, if a site's CORS policy specifies 'example.com' as allowed origin, malicious origins like 'notexample.com' or 'example.common.net' would be incorrectly whitelisted (Medium Blog). The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (MEDIUM) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N (NVD).

Impact

This vulnerability enables unauthorized access to user data on sites using the elysia-cors library for CORS validation. Attackers can bypass CORS restrictions and make cross-origin requests from unauthorized domains, potentially leading to unauthorized access to sensitive information (Medium Blog).

Mitigation and workarounds

The vulnerability has been fixed in version 1.3.1 of the elysia-cors library. Users should upgrade to this version or later to address the vulnerability. The fix implements proper origin validation instead of the vulnerable substring matching approach (Medium Blog).

Community reactions

The vulnerability was discovered and reported by Raghav Agrawal, who reached out to the library maintainer SaltyAom. The maintainer acknowledged the bug and promptly released a fix in version 1.3.1 (Medium Blog).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59834CRITICAL9.8
  • JavaScriptJavaScript
  • adb-mcp
NoNoSep 25, 2025
CVE-2020-36851CRITICAL9.5
  • JavaScriptJavaScript
  • cors-anywhere
NoNoSep 25, 2025
CVE-2025-59936CRITICAL9.4
  • JavaScriptJavaScript
  • get-jwks
NoYesSep 27, 2025
CVE-2025-59831HIGH8.7
  • JavaScriptJavaScript
  • git-commiters
NoYesSep 25, 2025
CVE-2025-59845HIGH8.2
  • JavaScriptJavaScript
  • @apollo/explorer
NoYesSep 26, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management