Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18558 | Withdrawn Advisory: microlight.js has a null pointer dereference vulnerability |
Github GHSA |
GHSA-64x7-m7rh-9m83 | Withdrawn Advisory: microlight.js has a null pointer dereference vulnerability |
Fri, 20 Jun 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 20 Jun 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A null pointer dereference vulnerability was discovered in microlight.js (version 0.0.7), a lightweight syntax highlighting library. When processing elements with non-standard CSS color values, the library fails to validate the result of a regular expression match before accessing its properties, leading to an uncaught TypeError and potential application crash. | A NULL pointer dereference vulnerability has been identified in the JavaScript library microlight version 0.0.7, a lightweight syntax highlighting library. When processing elements with non-standard CSS color values, the library fails to validate the result of a regular expression match before accessing its properties, leading to an uncaught TypeError and potential application crash. NOTE: this is disputed by multiple parties because there is no common scenario in which an adversary can insert those non-standard values. |
| References |
|
Wed, 18 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-476 | |
| Metrics |
cvssV3_1
|
Tue, 17 Jun 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A null pointer dereference vulnerability was discovered in microlight.js (version 0.0.7), a lightweight syntax highlighting library. When processing elements with non-standard CSS color values, the library fails to validate the result of a regular expression match before accessing its properties, leading to an uncaught TypeError and potential application crash. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-26T18:51:45.895Z
Reserved: 2025-04-22T00:00:00.000Z
Link: CVE-2025-45525
Updated: 2025-06-18T13:24:23.982Z
Status : Deferred
Published: 2025-06-17T20:15:32.150
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-45525
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA