Description
This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.
References (2)
Core 2
Core References
Exploit, Patch, Third Party Advisory x_refsource_misc
https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556
Patch, Third Party Advisory x_refsource_misc
https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21
Scores
CVSS v3
5.4
EPSS
0.0024
EPSS Percentile
46.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Details
CWE
CWE-843
Status
published
Products (2)
adonisjs/edge
< 5.3.2
npm/edge.js
0 - 5.3.2npm
Published
Sep 21, 2021
Tracked Since
Feb 18, 2026