CVE-2025-13425: CWE-476 NULL Pointer Dereference in Google OSV-SCALIBR
A bug in the filesystem traversal fallback path causes fs/diriterate/diriterate.go:Next() to overindex an empty slice when ReadDir returns nil for an empty directory, resulting in a panic (index out of range) and an application crash (denial of service) in OSV-SCALIBR.
AI Analysis
Technical Summary
CVE-2025-13425 is a vulnerability identified in the Google OSV-SCALIBR project, specifically affecting versions prior to 0.3.4. The root cause is a NULL pointer dereference (CWE-476) in the filesystem traversal fallback path within the diriterate.go file. When the ReadDir function returns nil for an empty directory, the Next() method attempts to index an empty slice, causing an index out of range panic. This results in an application crash, effectively causing a denial-of-service (DoS) condition. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The CVSS 4.0 score is 1.9, reflecting low severity due to limited impact and exploitation complexity. No known exploits exist in the wild, and the vulnerability does not affect confidentiality or integrity, only availability. The issue is primarily relevant to environments where OSV-SCALIBR is used for filesystem operations, potentially impacting development or local scanning workflows. The lack of a patch link suggests that a fix may be forthcoming or that users should upgrade to version 0.3.4 or later once released. The vulnerability highlights the importance of defensive programming practices, particularly validating return values from filesystem calls to prevent unexpected panics and crashes.
Potential Impact
The primary impact of CVE-2025-13425 is a denial-of-service condition caused by application crashes in OSV-SCALIBR when traversing empty directories. For European organizations, this could disrupt local development, testing, or scanning processes that rely on OSV-SCALIBR, potentially delaying software delivery or vulnerability assessments. Since exploitation requires local access and low privileges, the risk of remote attacks or widespread disruption is minimal. Confidentiality and integrity of data are not affected, limiting the severity to availability concerns. Organizations with automated pipelines or continuous integration systems using OSV-SCALIBR might experience intermittent failures, impacting operational efficiency. However, the absence of known exploits and the low CVSS score indicate a low overall risk. The impact is more pronounced in environments with heavy reliance on this tool for filesystem scanning or vulnerability detection, especially if fallback paths are frequently exercised.
Mitigation Recommendations
To mitigate CVE-2025-13425, organizations should: 1) Upgrade OSV-SCALIBR to version 0.3.4 or later as soon as the patch is available to eliminate the NULL pointer dereference issue. 2) Implement additional input validation and error handling in any custom code interacting with filesystem traversal functions to safely handle empty directories and nil returns. 3) Restrict local access to systems running OSV-SCALIBR to trusted users only, minimizing the risk of exploitation by low-privilege actors. 4) Monitor application logs for panics or crashes related to filesystem traversal to detect potential exploitation attempts or misconfigurations. 5) Incorporate robust testing of edge cases such as empty directories in development and CI pipelines to prevent similar issues. 6) Consider containerizing or sandboxing OSV-SCALIBR executions to limit the impact of crashes on broader systems. These steps go beyond generic advice by focusing on proactive code hygiene, access control, and operational monitoring tailored to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2025-13425: CWE-476 NULL Pointer Dereference in Google OSV-SCALIBR
Description
A bug in the filesystem traversal fallback path causes fs/diriterate/diriterate.go:Next() to overindex an empty slice when ReadDir returns nil for an empty directory, resulting in a panic (index out of range) and an application crash (denial of service) in OSV-SCALIBR.
AI-Powered Analysis
Technical Analysis
CVE-2025-13425 is a vulnerability identified in the Google OSV-SCALIBR project, specifically affecting versions prior to 0.3.4. The root cause is a NULL pointer dereference (CWE-476) in the filesystem traversal fallback path within the diriterate.go file. When the ReadDir function returns nil for an empty directory, the Next() method attempts to index an empty slice, causing an index out of range panic. This results in an application crash, effectively causing a denial-of-service (DoS) condition. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The CVSS 4.0 score is 1.9, reflecting low severity due to limited impact and exploitation complexity. No known exploits exist in the wild, and the vulnerability does not affect confidentiality or integrity, only availability. The issue is primarily relevant to environments where OSV-SCALIBR is used for filesystem operations, potentially impacting development or local scanning workflows. The lack of a patch link suggests that a fix may be forthcoming or that users should upgrade to version 0.3.4 or later once released. The vulnerability highlights the importance of defensive programming practices, particularly validating return values from filesystem calls to prevent unexpected panics and crashes.
Potential Impact
The primary impact of CVE-2025-13425 is a denial-of-service condition caused by application crashes in OSV-SCALIBR when traversing empty directories. For European organizations, this could disrupt local development, testing, or scanning processes that rely on OSV-SCALIBR, potentially delaying software delivery or vulnerability assessments. Since exploitation requires local access and low privileges, the risk of remote attacks or widespread disruption is minimal. Confidentiality and integrity of data are not affected, limiting the severity to availability concerns. Organizations with automated pipelines or continuous integration systems using OSV-SCALIBR might experience intermittent failures, impacting operational efficiency. However, the absence of known exploits and the low CVSS score indicate a low overall risk. The impact is more pronounced in environments with heavy reliance on this tool for filesystem scanning or vulnerability detection, especially if fallback paths are frequently exercised.
Mitigation Recommendations
To mitigate CVE-2025-13425, organizations should: 1) Upgrade OSV-SCALIBR to version 0.3.4 or later as soon as the patch is available to eliminate the NULL pointer dereference issue. 2) Implement additional input validation and error handling in any custom code interacting with filesystem traversal functions to safely handle empty directories and nil returns. 3) Restrict local access to systems running OSV-SCALIBR to trusted users only, minimizing the risk of exploitation by low-privilege actors. 4) Monitor application logs for panics or crashes related to filesystem traversal to detect potential exploitation attempts or misconfigurations. 5) Incorporate robust testing of edge cases such as empty directories in development and CI pipelines to prevent similar issues. 6) Consider containerizing or sandboxing OSV-SCALIBR executions to limit the impact of crashes on broader systems. These steps go beyond generic advice by focusing on proactive code hygiene, access control, and operational monitoring tailored to this specific vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Date Reserved
- 2025-11-19T16:07:19.171Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691f3714b661599aeb20f317
Added to database: 11/20/2025, 3:43:16 PM
Last enriched: 11/20/2025, 3:58:43 PM
Last updated: 11/21/2025, 6:42:59 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64483: CWE-284: Improper Access Control in wazuh wazuh-dashboard-plugins
MediumCVE-2025-13132: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in The Browser Company of New York Dia
HighCVE-2025-12973: CWE-434 Unrestricted Upload of File with Dangerous Type in oc3dots S2B AI Assistant – ChatBot, ChatGPT, OpenAI, Content & Image Generator
HighCVE-2025-13470: CWE-330 Use of Insufficiently Random Values in Ribose RNP
HighCVE-2023-30801: CWE-1392: Use of Default Credentials in qBittorrent qBittorrent client
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.