The package nanoid from 3.0.0 and before 3.1.31 are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
References
Configurations
History
03 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 05:51
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 4.0 |
| References | () https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444 - Exploit, Third Party Advisory | |
| References | () https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575 - Patch, Third Party Advisory | |
| References | () https://github.com/ai/nanoid/pull/328 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550 - Exploit, Third Party Advisory | |
| References | () https://snyk.io/vuln/SNYK-JS-NANOID-2332193 - Exploit, Third Party Advisory |
Information
Published : 2022-01-14 20:15
Updated : 2025-11-03 22:15
NVD link : CVE-2021-23566
Mitre link : CVE-2021-23566
CVE.ORG link : CVE-2021-23566
JSON object : View
Products Affected
nanoid_project
- nanoid
CWE
CWE-704
Incorrect Type Conversion or Cast
