Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66031: CWE-674: Uncontrolled Recursion in digitalbazaar forge

0
High
VulnerabilityCVE-2025-66031cvecve-2025-66031cwe-674
Published: Wed Nov 26 2025 (11/26/2025, 22:23:26 UTC)
Source: CVE Database V5
Vendor/Project: digitalbazaar
Product: forge

Description

CVE-2025-66031 is a high-severity vulnerability in the node-forge JavaScript library, specifically versions prior to 1. 3. 2. It involves uncontrolled recursion during ASN. 1 DER parsing, allowing remote unauthenticated attackers to craft deeply nested ASN. 1 structures that cause stack exhaustion and Denial-of-Service (DoS). The vulnerability requires no authentication or user interaction and can be triggered by sending malicious DER inputs to affected systems using node-forge. This flaw impacts the confidentiality and availability of services relying on node-forge for TLS or cryptographic operations. The issue has been patched in version 1. 3.

AI-Powered Analysis

AILast updated: 11/26/2025, 22:54:55 UTC

Technical Analysis

The vulnerability identified as CVE-2025-66031 affects the node-forge library, a widely used JavaScript implementation of Transport Layer Security (TLS) and cryptographic functions. The root cause is an uncontrolled recursion flaw (CWE-674) in the ASN.1 DER parsing logic. ASN.1 (Abstract Syntax Notation One) is a standard interface description language for defining data structures used in cryptography and network protocols. Node-forge versions 1.3.1 and earlier do not properly limit recursion depth when parsing ASN.1 structures, allowing attackers to craft deeply nested DER-encoded inputs. When such malicious inputs are processed, the recursive parsing leads to stack exhaustion, causing the application to crash or become unresponsive, resulting in a Denial-of-Service (DoS). The vulnerability can be exploited remotely without any authentication or user interaction, making it particularly dangerous for exposed services that parse untrusted ASN.1 data. The CVSS 4.0 base score of 8.7 reflects the high impact on availability and the ease of exploitation. The issue was publicly disclosed on November 26, 2025, and fixed in node-forge version 1.3.2. No public exploits have been reported yet, but the vulnerability poses a significant risk to any system using vulnerable versions of node-forge for TLS or cryptographic operations, especially in web applications and network services.

Potential Impact

For European organizations, the primary impact of CVE-2025-66031 is the potential for Denial-of-Service attacks against services relying on node-forge for TLS or cryptographic processing. This can disrupt availability of critical applications, including secure communications, identity verification, and data encryption services. Organizations in sectors such as finance, healthcare, government, and telecommunications are particularly at risk due to their reliance on secure cryptographic libraries. The vulnerability could be exploited to degrade service performance or cause outages, impacting business continuity and potentially leading to regulatory compliance issues under GDPR if services become unavailable. Since the vulnerability does not compromise confidentiality or integrity directly, the main concern is service disruption. However, prolonged outages could indirectly affect data protection and trust. European organizations using node-forge in client-side or server-side JavaScript environments must assess their exposure and remediate promptly to avoid operational impacts.

Mitigation Recommendations

European organizations should immediately audit their software dependencies to identify any usage of node-forge versions prior to 1.3.2. The primary mitigation is to upgrade all instances of node-forge to version 1.3.2 or later, where the uncontrolled recursion flaw has been patched. For environments where immediate upgrade is not feasible, implementing input validation and limiting the depth of ASN.1 structures before parsing can reduce risk. Network-level protections such as Web Application Firewalls (WAFs) can be tuned to detect and block suspiciously deep or malformed ASN.1 DER inputs. Additionally, monitoring application logs for stack overflow or crash patterns related to ASN.1 parsing can help detect exploitation attempts. Organizations should also review their incident response plans to handle potential DoS attacks targeting this vulnerability. Finally, developers should adopt secure coding practices to avoid similar recursive parsing issues in the future and consider fuzz testing ASN.1 parsers to identify vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-21T01:08:02.614Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692781c3d322a87b22e508d8

Added to database: 11/26/2025, 10:40:03 PM

Last enriched: 11/26/2025, 10:54:55 PM

Last updated: 11/27/2025, 12:01:05 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats