Versions of the package lockfile-lint-api before 5.9.2 are vulnerable to Incorrect Behavior Order: Early Validation via the resolved attribute of the package URL validation which can be bypassed by extending the package name allowing an attacker to install other npm packages than the intended one.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Jun 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lirantal
Lirantal lockfile-lint-api |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:lirantal:lockfile-lint-api:*:*:*:*:*:node.js:*:* | |
Vendors & Products |
Lirantal
Lirantal lockfile-lint-api |
Fri, 16 May 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 16 May 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Versions of the package lockfile-lint-api before 5.9.2 are vulnerable to Incorrect Behavior Order: Early Validation via the resolved attribute of the package URL validation which can be bypassed by extending the package name allowing an attacker to install other npm packages than the intended one. | |
Weaknesses | CWE-179 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: snyk
Published: 2025-05-16T05:00:04.621Z
Updated: 2025-05-16T17:39:24.899Z
Reserved: 2025-05-15T09:39:15.877Z
Link: CVE-2025-4759

Updated: 2025-05-16T17:37:20.716Z

Status : Analyzed
Published: 2025-05-16T05:15:38.297
Modified: 2025-06-03T15:57:29.763
Link: CVE-2025-4759

No data.