A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 30 Sep 2025 17:45:00 +0000

Type Values Removed Values Added
Description A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-30T17:35:15.229Z

Reserved: 2025-08-16T00:00:00.000Z

Link: CVE-2025-56200

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-30T18:15:50.307

Modified: 2025-09-30T18:15:50.307

Link: CVE-2025-56200

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.