Vulnerability DatabaseGHSA-5fp6-4xw3-xqq3

GHSA-5fp6-4xw3-xqq3
JavaScript vulnerability analysis and mitigation

Overview

The vulnerability (GHSA-5fp6-4xw3-xqq3) affects @keystone-6/core's bundled cuid package, which was discovered to be insecure and subsequently deprecated. The issue was published on June 11, 2023, and affects all versions of @keystone-6/core up to version 5.3.1. The vulnerability stems from the use of k-sortable and non-cryptographic IDs, which are inherently insecure according to the package author (GitHub Advisory).

Technical details

The vulnerability relates to the use of cuid, which generates collision-resistant IDs optimized for horizontal scaling. The issue lies in its k-sortable and non-cryptographic nature, which makes it potentially predictable. This applies to various ID types including Ulid, ObjectId, KSUID, and all UUIDs. The package author has marked it as deprecated due to these security concerns and recommends using @paralleldrive/cuid2 instead (Cuid Repo).

Impact

The impact is considered Low severity. The main risk lies in the potential predictability of generated IDs, which could lead to unauthorized access or exploitation in systems where ID guessing could be leveraged for malicious purposes. The vulnerability particularly affects applications where the predictability of IDs could expose sensitive information or enable unauthorized access to resources (GitHub Advisory).

Mitigation and workarounds

As a temporary solution, users can implement custom identifiers as detailed in keystonejs/keystone#8645. The development team is waiting for Prisma to add support for cuid2, which is the recommended secure alternative. Alternatively, they are considering defaulting to a random string generation method. For cases where cuid features are specifically needed, users should carefully evaluate their security requirements (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55182CRITICAL10
  • JavaScriptJavaScript
  • react
NoYesDec 03, 2025
CVE-2025-66401CRITICAL9.8
  • JavaScriptJavaScript
  • mcp-watch
NoNoDec 01, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • @angular/compiler
NoYesDec 01, 2025
CVE-2025-66415MEDIUM6.9
  • JavaScriptJavaScript
  • @fastify/reply-from
NoYesDec 01, 2025
CVE-2025-66405MEDIUM6.9
  • JavaScriptJavaScript
  • @portkey-ai/gateway
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management