A weakness has been identified in QuickJS up to eb2c89087def1829ed99630cb14b549d7a98408c. This affects the function js_array_buffer_slice of the file quickjs.c. This manipulation causes buffer over-read. The attack is restricted to local execution. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery Patch name: c6fe5a98fd3ef3b7064e6e0145dfebfe12449fea. To fix this issue, it is recommended to deploy a patch.

Subscriptions

Vendors Products
Bellard Subscribe
Quickjs Subscribe
Quickjs-ng Subscribe
Quickjs Subscribe

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 08 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Bellard
Bellard quickjs
Weaknesses CWE-125
CPEs cpe:2.3:a:bellard:quickjs:*:*:*:*:*:*:*:*
Vendors & Products Bellard
Bellard quickjs

Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Quickjs-ng
Quickjs-ng quickjs
Vendors & Products Quickjs-ng
Quickjs-ng quickjs

Wed, 05 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 05 Nov 2025 18:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in QuickJS up to eb2c89087def1829ed99630cb14b549d7a98408c. This affects the function js_array_buffer_slice of the file quickjs.c. This manipulation causes buffer over-read. The attack is restricted to local execution. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery Patch name: c6fe5a98fd3ef3b7064e6e0145dfebfe12449fea. To fix this issue, it is recommended to deploy a patch.
Title QuickJS quickjs.c js_array_buffer_slice buffer over-read
Weaknesses CWE-119
CWE-126
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-11-05T19:26:04.149Z

Reserved: 2025-11-05T13:54:35.678Z

Link: CVE-2025-12745

cve-icon Vulnrichment

Updated: 2025-11-05T18:50:50.230Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-05T19:15:50.390

Modified: 2026-01-08T21:50:36.420

Link: CVE-2025-12745

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-06T10:06:53Z

Weaknesses