**Note:**
Following our established security policy, we attempted to contact the maintainer regarding this vulnerability, but haven't received a response.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g4mf-96x5-5m2c | Cloudinary Node SDK is vulnerable to Arbitrary Argument Injection through parameters that include an ampersand |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 10 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 10 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cloudinary
Cloudinary cloudinary |
|
| Vendors & Products |
Cloudinary
Cloudinary cloudinary |
Mon, 10 Nov 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package cloudinary before 2.7.0 are vulnerable to Arbitrary Argument Injection due to improper parsing of parameter values containing an ampersand. An attacker can inject additional, unintended parameters. This could lead to a variety of malicious outcomes, such as bypassing security checks, altering data, or manipulating the application's behavior. **Note:** Following our established security policy, we attempted to contact the maintainer regarding this vulnerability, but haven't received a response. | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-11-10T16:00:21.663Z
Reserved: 2025-11-02T11:43:23.698Z
Link: CVE-2025-12613
Updated: 2025-11-10T16:00:17.386Z
Status : Awaiting Analysis
Published: 2025-11-10T05:15:42.900
Modified: 2025-11-12T16:19:59.103
Link: CVE-2025-12613
No data.
OpenCVE Enrichment
Updated: 2025-11-10T09:33:06Z
Github GHSA