Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p5wg-g6qr-c7cg

Опубликовано: 26 янв. 2026
Источник: github
Github: Прошло ревью
CVSS3: 5.5

Описание

Withdrawn Advisory: eslint has a Stack Overflow when serializing objects with circular references

Withdrawn Advisory

This advisory has been withdrawn because RuleTester is used for testing rules during development and results in a error rather than crashing the application.

Original Description

There is a Stack Overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a Stack Overflow.

Пакеты

Наименование

eslint

npm
Затронутые версииВерсия исправления

< 9.26.0

9.26.0

EPSS

Процентиль: 2%
0.00012
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-674

Связанные уязвимости

CVSS3: 5.5
ubuntu
13 дней назад

Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.

CVSS3: 5.5
nvd
13 дней назад

Stack overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in eslint/lib/shared/serialization.js. The exploit is triggered via the RuleTester.run() method, which validates test cases and checks for duplicates. During validation, the internal function checkDuplicateTestCase() is called, which in turn uses the isSerializable() function for serialization checks. When a circular reference object is passed in, isSerializable() enters infinite recursion, ultimately causing a stack overflow.

CVSS3: 5.5
debian
13 дней назад

Stack overflow vulnerability in eslint before 9.26.0 when serializing ...

EPSS

Процентиль: 2%
0.00012
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-674