CVE-2025-62490

In quickjs, in js_print_object, when printing an array, the function first fetches the array length and then loops over it. The issue is, printing a value is not side-effect free. An attacker-defined callback could run during js_print_value, during which the array could get resized and len1 become out of bounds. This results in a use-after-free.A second instance occurs in the same function during printing of a map or set objects. The code iterates over ms->records list, but once again, elements could be removed from the list during js_print_value call.
References
Link Resource
https://bellard.org/quickjs/Changelog Release Notes
https://issuetracker.google.com/434196651 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:quickjs_project:quickjs:*:*:*:*:*:*:*:*

History

30 Oct 2025, 16:29

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References () https://bellard.org/quickjs/Changelog - () https://bellard.org/quickjs/Changelog - Release Notes
References () https://issuetracker.google.com/434196651 - () https://issuetracker.google.com/434196651 - Exploit, Issue Tracking
CPE cpe:2.3:a:quickjs_project:quickjs:*:*:*:*:*:*:*:*
First Time Quickjs Project quickjs
Quickjs Project

16 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-16 16:15

Updated : 2025-10-30 16:29


NVD link : CVE-2025-62490

Mitre link : CVE-2025-62490

CVE.ORG link : CVE-2025-62490


JSON object : View

Products Affected

quickjs_project

  • quickjs
CWE
CWE-416

Use After Free