
Cloud Vulnerability DB
A community-led vulnerabilities database
An improper input validation vulnerability was discovered in the cipher-base npm package (CVE-2025-9287) affecting versions through 1.0.4. The vulnerability was disclosed on August 20, 2025, and impacts the cipher-base package's input handling mechanism (GitHub Advisory, NVD).
The vulnerability stems from missing input type checks that can allow types other than well-formed Buffer or string inputs, resulting in undefined behavior. The issue has received a CVSS v4.0 base score of 9.1 (Critical) with the vector string CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:N. The vulnerability is classified as CWE-20 (Improper Input Validation) (GitHub Advisory, NVD).
The vulnerability can lead to several serious impacts including hash state rewind on specific input types, value miscalculation leading to potential hash collisions, and DoS conditions. More critically, it can result in matching hashes but different numeric representations, potentially leading to private key extraction from cryptography libraries when nonces are generated through affected hashes (GitHub Advisory).
Users should upgrade to versions newer than 1.0.4 which contain the fix. The issue has been addressed through a pull request that implements proper type checking for multi-byte-wide TypedArray inputs (GitHub PR, GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."