Description

In quickjs, in js_print_object, when printing an array, the function first fetches the array length and then loops over it. The issue is, printing a value is not side-effect free. An attacker-defined callback could run during js_print_value, during which the array could get resized and len1 become out of bounds. This results in a use-after-free.A second instance occurs in the same function during printing of a map or set objects. The code iterates over ms->records list, but once again, elements could be removed from the list during js_print_value call.

INFO

Published Date :

2025-10-16T15:51:06.100Z

Last Modified :

2025-10-16T18:08:20.982Z

Source :

Google
AFFECTED PRODUCTS

The following products are affected by CVE-2025-62490 vulnerability.

Vendors Products
Quickjs-ng
  • Quickjs
Quickjs Project
  • Quickjs
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-62490.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact