CVE-2025-13425: CWE-476 NULL Pointer Dereference in Google OSV-SCALIBR
CVE-2025-13425 is a low-severity vulnerability in Google OSV-SCALIBR versions prior to 0. 3. 4, caused by a NULL pointer dereference in the filesystem traversal fallback path. Specifically, when ReadDir returns nil for an empty directory, the function fs/diriterate/diriterate. go:Next() attempts to index an empty slice, causing an index out of range panic and crashing the application. This results in a denial of service but does not allow code execution or data compromise. The vulnerability requires local privileges and does not need user interaction. No known exploits are currently in the wild. European organizations using OSV-SCALIBR should update to version 0. 3.
AI Analysis
Technical Summary
CVE-2025-13425 is a vulnerability identified in Google OSV-SCALIBR, a tool used for software vulnerability analysis. The flaw arises in the filesystem traversal fallback mechanism, specifically within the function fs/diriterate/diriterate.go:Next(). When the ReadDir function returns nil—indicating an empty directory—the code erroneously attempts to access an element in an empty slice, leading to an index out of range panic. This causes the application to crash, resulting in a denial of service (DoS) condition. The root cause is a NULL pointer dereference (CWE-476), a common programming error where the code does not properly check for nil or empty values before dereferencing. The vulnerability affects versions of OSV-SCALIBR earlier than 0.3.4. Exploitation requires local privileges (AV:L) and low privileges (PR:L), with no authentication or user interaction needed. The impact is limited to application availability, with no confidentiality or integrity compromise. The CVSS v4.0 score is 1.9, reflecting the low severity and limited attack surface. No patches or exploits are currently publicly available, but updating to version 0.3.4 or later is recommended to resolve the issue.
Potential Impact
The primary impact of CVE-2025-13425 is denial of service due to application crashes in OSV-SCALIBR. For European organizations relying on OSV-SCALIBR for vulnerability scanning or software analysis, this could lead to interruptions in security workflows or automated vulnerability assessments. While the vulnerability does not allow for privilege escalation, data leakage, or code execution, repeated crashes could degrade operational efficiency or delay vulnerability management processes. Organizations with automated pipelines integrating OSV-SCALIBR might experience temporary outages or require manual intervention to restart services. Given the local access requirement, remote exploitation is unlikely, reducing the risk of widespread attacks. However, in environments where OSV-SCALIBR is critical, such as security operations centers or software development teams, availability disruptions could indirectly affect security posture and compliance efforts.
Mitigation Recommendations
To mitigate CVE-2025-13425, organizations should upgrade OSV-SCALIBR to version 0.3.4 or later, where the issue has been addressed. Until the update is applied, it is advisable to implement monitoring for application crashes and automate restarts to minimize downtime. Restrict local access to systems running OSV-SCALIBR to trusted personnel only, reducing the risk of intentional or accidental exploitation. Review and harden user privilege assignments to ensure that only necessary users have access to the tool. Incorporate error handling and input validation in custom scripts or integrations that invoke OSV-SCALIBR to detect and handle empty directories gracefully. Additionally, maintain up-to-date backups of configurations and scan results to prevent data loss during unexpected crashes. Regularly audit and monitor logs for signs of repeated crashes or abnormal behavior related to filesystem traversal operations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-13425: CWE-476 NULL Pointer Dereference in Google OSV-SCALIBR
Description
CVE-2025-13425 is a low-severity vulnerability in Google OSV-SCALIBR versions prior to 0. 3. 4, caused by a NULL pointer dereference in the filesystem traversal fallback path. Specifically, when ReadDir returns nil for an empty directory, the function fs/diriterate/diriterate. go:Next() attempts to index an empty slice, causing an index out of range panic and crashing the application. This results in a denial of service but does not allow code execution or data compromise. The vulnerability requires local privileges and does not need user interaction. No known exploits are currently in the wild. European organizations using OSV-SCALIBR should update to version 0. 3.
AI-Powered Analysis
Technical Analysis
CVE-2025-13425 is a vulnerability identified in Google OSV-SCALIBR, a tool used for software vulnerability analysis. The flaw arises in the filesystem traversal fallback mechanism, specifically within the function fs/diriterate/diriterate.go:Next(). When the ReadDir function returns nil—indicating an empty directory—the code erroneously attempts to access an element in an empty slice, leading to an index out of range panic. This causes the application to crash, resulting in a denial of service (DoS) condition. The root cause is a NULL pointer dereference (CWE-476), a common programming error where the code does not properly check for nil or empty values before dereferencing. The vulnerability affects versions of OSV-SCALIBR earlier than 0.3.4. Exploitation requires local privileges (AV:L) and low privileges (PR:L), with no authentication or user interaction needed. The impact is limited to application availability, with no confidentiality or integrity compromise. The CVSS v4.0 score is 1.9, reflecting the low severity and limited attack surface. No patches or exploits are currently publicly available, but updating to version 0.3.4 or later is recommended to resolve the issue.
Potential Impact
The primary impact of CVE-2025-13425 is denial of service due to application crashes in OSV-SCALIBR. For European organizations relying on OSV-SCALIBR for vulnerability scanning or software analysis, this could lead to interruptions in security workflows or automated vulnerability assessments. While the vulnerability does not allow for privilege escalation, data leakage, or code execution, repeated crashes could degrade operational efficiency or delay vulnerability management processes. Organizations with automated pipelines integrating OSV-SCALIBR might experience temporary outages or require manual intervention to restart services. Given the local access requirement, remote exploitation is unlikely, reducing the risk of widespread attacks. However, in environments where OSV-SCALIBR is critical, such as security operations centers or software development teams, availability disruptions could indirectly affect security posture and compliance efforts.
Mitigation Recommendations
To mitigate CVE-2025-13425, organizations should upgrade OSV-SCALIBR to version 0.3.4 or later, where the issue has been addressed. Until the update is applied, it is advisable to implement monitoring for application crashes and automate restarts to minimize downtime. Restrict local access to systems running OSV-SCALIBR to trusted personnel only, reducing the risk of intentional or accidental exploitation. Review and harden user privilege assignments to ensure that only necessary users have access to the tool. Incorporate error handling and input validation in custom scripts or integrations that invoke OSV-SCALIBR to detect and handle empty directories gracefully. Additionally, maintain up-to-date backups of configurations and scan results to prevent data loss during unexpected crashes. Regularly audit and monitor logs for signs of repeated crashes or abnormal behavior related to filesystem traversal operations.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Date Reserved
- 2025-11-19T16:07:19.171Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691f3714b661599aeb20f317
Added to database: 11/20/2025, 3:43:16 PM
Last enriched: 11/27/2025, 4:45:26 PM
Last updated: 1/7/2026, 9:22:48 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.