Vulnerability Description
Versions of the package validator before 13.15.22 are vulnerable to Incomplete Filtering of One or More Instances of Special Elements in the isLength() function that does not take into account Unicode variation selectors (\uFE0F, \uFE0E) appearing in a sequence which lead to improper string length calculation. This can lead to an application using isLength for input validation accepting strings significantly longer than intended, resulting in issues like data truncation in databases, buffer overflows in other system components, or denial-of-service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Validator Project | Validator | < 13.15.22 |
Related Weaknesses (CWE)
References
- https://gist.github.com/koral--/ad31208b25b9e3d1e2e35f1d4d72572eExploitThird Party Advisory
- https://github.com/validatorjs/validator.js/pull/2616Issue TrackingPatch
- https://security.snyk.io/vuln/SNYK-JS-VALIDATOR-13653476ExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2026/Jan/27
- https://security.snyk.io/vuln/SNYK-JS-VALIDATOR-13653476ExploitThird Party Advisory
FAQ
What is CVE-2025-12758?
CVE-2025-12758 is a vulnerability with a CVSS score of 7.5 (HIGH). Versions of the package validator before 13.15.22 are vulnerable to Incomplete Filtering of One or More Instances of Special Elements in the isLength() function that does not take into account Unicode...
How severe is CVE-2025-12758?
CVE-2025-12758 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-12758?
Check the references section above for vendor advisories and patch information. Affected products include: Validator Project Validator.