Impact
The vulnerability resides in the ensureSize() function of @dicebear/converter. Prior to version 9.4.2 the function used a regular‑expression to cap width and height attributes at 2048 pixels. Attackers can inject XML comments that cause the expr to misidentify the root <svg> element, allowing the SVG to be rendered with attacker‑specified large dimensions by @resvg/resvg-js. This can exhaust memory and crash the Node.js process, resulting in a denial‑of‑service condition. The weakness maps to CWE‑185.
Affected Systems
Vulnerable when applications use the DiceBear avatar library version earlier than 9.4.2. The issue affects Node.js projects that import @dicebear/converter and render SVGs through @resvg/resvg-js. All systems that rely on DiceBear to generate avatars, such as web front‑ends, APIs, or micro‑services, are potentially impacted if they use an affected library version.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity of service disruption. EPSS data is unavailable, but the vulnerability is not listed in CISA KEV, suggesting no widespread observed exploitation at this time. Likely attack vector involves supplying specially crafted SVG content to a vulnerable application. Because the flaw is within a library, exploitation requires the attacker to deliver malicious SVG data to an application that processes it, which may occur through user‑supplied avatar images or internal rendering calls. Once triggered, the exploit can cause an out‑of‑memory crash, disabling the affected service until the process restarts.
OpenCVE Enrichment
Github GHSA