CVE-2025-65570

A type confusion in jsish 2.0 allows incorrect control flow during execution of the OP_NEXT opcode. When an “instanceof” expression uses an array element access as the left-hand operand inside a for-in loop, the instructions implementation leaves an additional array reference on the stack rather than consuming it during OP_INSTANCEOF. As a result, OP_NEXT interprets the array as an iterator object and reads the iterCmd function pointer from an invalid structure, potentially causing a crash or enabling code execution depending on heap layout.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:jsish:jsish:2.0:*:*:*:*:*:*:*

History

31 Dec 2025, 20:04

Type Values Removed Values Added
First Time Jsish
Jsish jsish
CPE cpe:2.3:a:jsish:jsish:2.0:*:*:*:*:*:*:*
References () https://blog.mcsky.ro/writeups/2025/11/15/inline8-writeup.html - () https://blog.mcsky.ro/writeups/2025/11/15/inline8-writeup.html - Exploit, Third Party Advisory

31 Dec 2025, 17:15

Type Values Removed Values Added
References () https://blog.mcsky.ro/writeups/2025/11/15/inline8-writeup.html - () https://blog.mcsky.ro/writeups/2025/11/15/inline8-writeup.html -
CWE CWE-843
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

29 Dec 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-29 15:16

Updated : 2025-12-31 20:04


NVD link : CVE-2025-65570

Mitre link : CVE-2025-65570

CVE.ORG link : CVE-2025-65570


JSON object : View

Products Affected

jsish

  • jsish
CWE
CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')