Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13425: CWE-476 NULL Pointer Dereference in Google OSV-SCALIBR

0
Low
VulnerabilityCVE-2025-13425cvecve-2025-13425cwe-476
Published: Thu Nov 20 2025 (11/20/2025, 15:30:31 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: OSV-SCALIBR

Description

A bug in the filesystem traversal fallback path causes fs/diriterate/diriterate.go:Next() to overindex an empty slice when ReadDir returns nil for an empty directory, resulting in a panic (index out of range) and an application crash (denial of service) in OSV-SCALIBR.

AI-Powered Analysis

AILast updated: 11/20/2025, 15:58:43 UTC

Technical Analysis

CVE-2025-13425 is a vulnerability identified in the Google OSV-SCALIBR project, specifically affecting versions prior to 0.3.4. The root cause is a NULL pointer dereference (CWE-476) in the filesystem traversal fallback path within the diriterate.go file. When the ReadDir function returns nil for an empty directory, the Next() method attempts to index an empty slice, causing an index out of range panic. This results in an application crash, effectively causing a denial-of-service (DoS) condition. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The CVSS 4.0 score is 1.9, reflecting low severity due to limited impact and exploitation complexity. No known exploits exist in the wild, and the vulnerability does not affect confidentiality or integrity, only availability. The issue is primarily relevant to environments where OSV-SCALIBR is used for filesystem operations, potentially impacting development or local scanning workflows. The lack of a patch link suggests that a fix may be forthcoming or that users should upgrade to version 0.3.4 or later once released. The vulnerability highlights the importance of defensive programming practices, particularly validating return values from filesystem calls to prevent unexpected panics and crashes.

Potential Impact

The primary impact of CVE-2025-13425 is a denial-of-service condition caused by application crashes in OSV-SCALIBR when traversing empty directories. For European organizations, this could disrupt local development, testing, or scanning processes that rely on OSV-SCALIBR, potentially delaying software delivery or vulnerability assessments. Since exploitation requires local access and low privileges, the risk of remote attacks or widespread disruption is minimal. Confidentiality and integrity of data are not affected, limiting the severity to availability concerns. Organizations with automated pipelines or continuous integration systems using OSV-SCALIBR might experience intermittent failures, impacting operational efficiency. However, the absence of known exploits and the low CVSS score indicate a low overall risk. The impact is more pronounced in environments with heavy reliance on this tool for filesystem scanning or vulnerability detection, especially if fallback paths are frequently exercised.

Mitigation Recommendations

To mitigate CVE-2025-13425, organizations should: 1) Upgrade OSV-SCALIBR to version 0.3.4 or later as soon as the patch is available to eliminate the NULL pointer dereference issue. 2) Implement additional input validation and error handling in any custom code interacting with filesystem traversal functions to safely handle empty directories and nil returns. 3) Restrict local access to systems running OSV-SCALIBR to trusted users only, minimizing the risk of exploitation by low-privilege actors. 4) Monitor application logs for panics or crashes related to filesystem traversal to detect potential exploitation attempts or misconfigurations. 5) Incorporate robust testing of edge cases such as empty directories in development and CI pipelines to prevent similar issues. 6) Consider containerizing or sandboxing OSV-SCALIBR executions to limit the impact of crashes on broader systems. These steps go beyond generic advice by focusing on proactive code hygiene, access control, and operational monitoring tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Google
Date Reserved
2025-11-19T16:07:19.171Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691f3714b661599aeb20f317

Added to database: 11/20/2025, 3:43:16 PM

Last enriched: 11/20/2025, 3:58:43 PM

Last updated: 11/21/2025, 6:42:59 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats