Description
A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
References (4)
Core 4
Core References
Broken Link
http://validatorjs.com
Exploit, Third Party Advisory
https://gist.github.com/junan-98/27ae092aa40e2a057d41a0f95148f666
Exploit, Third Party Advisory
https://gist.github.com/junan-98/a93130505b258b9e4ec9f393e7533596
Scores
CVSS v3
6.1
EPSS
0.0005
EPSS Percentile
16.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
npm/validator
0 - 13.15.20npm
validator_project/validator
< 3.15.15
Published
Sep 30, 2025
Tracked Since
Feb 18, 2026