Vulnerability Description
Versions of the package lockfile-lint-api before 5.9.2 are vulnerable to Incorrect Behavior Order: Early Validation via the resolved attribute of the package URL validation which can be bypassed by extending the package name allowing an attacker to install other npm packages than the intended one.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lirantal | Lockfile-Lint-Api | < 5.9.2 |
Related Weaknesses (CWE)
References
- https://gist.github.com/Xavier59/881aef04940970dc3e738dcbff64151fExploit
- https://github.com/lirantal/lockfile-lint/blob/89b5cad028df4d77bab2b73ac93bc61e3Broken Link
- https://github.com/lirantal/lockfile-lint/commit/9e5305bd3e4f0c6acc0d23ec43eac2bPatch
- https://github.com/lirantal/lockfile-lint/pull/204Patch
- https://security.snyk.io/vuln/SNYK-JS-LOCKFILELINTAPI-10169587Third Party Advisory
FAQ
What is CVE-2025-4759?
CVE-2025-4759 is a vulnerability with a CVSS score of 8.3 (HIGH). Versions of the package lockfile-lint-api before 5.9.2 are vulnerable to Incorrect Behavior Order: Early Validation via the resolved attribute of the package URL validation which can be bypassed by ex...
How severe is CVE-2025-4759?
CVE-2025-4759 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-4759?
Check the references section above for vendor advisories and patch information. Affected products include: Lirantal Lockfile-Lint-Api.