CVE-2025-62378
JavaScript vulnerability analysis and mitigation

Overview

CommandKit, a discord.js meta-framework for building Discord bots, contains a logic flaw in versions 1.2.0-rc.1 through 1.2.0-rc.11 that affects how the commandName property is exposed in the message command handler. The vulnerability was discovered and disclosed on October 13, 2025, affecting the JavaScript ecosystem. The issue has been assigned CVE-2025-62378 with a CVSS v3.1 score of 6.1 (Medium) (GitHub Advisory, NVD).

Technical details

The vulnerability stems from incorrect handling of command aliases in the message command handler. When a message command is invoked using an alias, the ctx.commandName value reflects the alias instead of the canonical command name in both middleware functions and within the command's run function. This behavior contradicts the implicit documentation and examples that suggest ctx.commandName should represent the canonical command identifier. The issue is tracked as CWE-706 (Use of Incorrectly-Resolved Name or Reference) and has a CVSS vector of CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N (Miggo, GitHub Advisory).

Impact

The vulnerability can lead to unauthorized command execution or inaccurate access control decisions when developers rely on ctx.commandName for security-sensitive logic such as permission checks, rate limiting, or audit logging. The impact is particularly significant for applications that use this value for security validations (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in version 1.2.0-rc.12, where ctx.commandName now consistently returns the actual canonical command name regardless of the alias used. For users unable to upgrade immediately, two workarounds are available: use ctx.command.data.command.name for permission validations, or include all command aliases in permission logic (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-8083HIGH8.6
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025
CVE-2025-67750HIGH8.4
  • JavaScriptJavaScript
  • lightning-flow-scanner
NoYesDec 12, 2025
CVE-2025-8082MEDIUM6.3
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management