CVE-2025-50864 – @elysiajs/cors
Package
Manager: npm
Name: @elysiajs/cors
Vulnerable Version: >=0 <1.3.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00031 pctl0.07385
Details
elysia-cors Origin Validation Error An Origin Validation Error in the elysia-cors library thru 1.3.0 allows attackers to bypass Cross-Origin Resource Sharing (CORS) restrictions. The library incorrectly validates the supplied origin by checking if it is a substring of any domain in the site's CORS policy, rather than performing an exact match. For example, a malicious origin like "notexample.com", "example.common.net" is whitelisted when the site's CORS policy specifies "example.com." This vulnerability enables unauthorized access to user data on sites using the elysia-cors library for CORS validation.
Metadata
Created: 2025-08-20T15:31:42Z
Modified: 2025-08-21T15:41:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-f9qj-4c5x-cpcw/GHSA-f9qj-4c5x-cpcw.json
CWE IDs: ["CWE-178", "CWE-346"]
Alternative ID: GHSA-f9qj-4c5x-cpcw
Finding: F086
Auto approve: 1