A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 30 Sep 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-30T17:35:15.229Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-56200

No data.

Status : Received
Published: 2025-09-30T18:15:50.307
Modified: 2025-09-30T18:15:50.307
Link: CVE-2025-56200

No data.

No data.