An Origin Validation Error in the elysia-cors library thru 1.3.0 allows attackers to bypass Cross-Origin Resource Sharing (CORS) restrictions. The library incorrectly validates the supplied origin by checking if it is a substring of any domain in the site's CORS policy, rather than performing an exact match. For example, a malicious origin like "notexample.com", "example.common.net" is whitelisted when the site's CORS policy specifies "example.com." This vulnerability enables unauthorized access to user data on sites using the elysia-cors library for CORS validation.
References
Configurations
No configuration.
History
21 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | CWE-178 | |
Summary |
|
20 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-20 15:15
Updated : 2025-08-22 18:09
NVD link : CVE-2025-50864
Mitre link : CVE-2025-50864
CVE.ORG link : CVE-2025-50864
JSON object : View
Products Affected
No product.
CWE
CWE-178
Improper Handling of Case Sensitivity