Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23570 | IPX Allows Path Traversal via Prefix Matching Bypass |
Github GHSA |
GHSA-mm3p-j368-7jcr | IPX Allows Path Traversal via Prefix Matching Bypass |
Thu, 09 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:unjs:ipx:*:*:*:*:*:node.js:*:* | |
| Metrics |
cvssV3_1
|
Tue, 05 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 Aug 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Unjs
Unjs ipx |
|
| Vendors & Products |
Unjs
Unjs ipx |
Tue, 05 Aug 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IPX is an image optimizer powered by sharp and svgo. In versions 1.3.1 and below, 2.0.0-0 through 2.1.0, and 3.0.0 through 3.1.0, the approach used to check whether a path is within allowed directories is vulnerable to path prefix bypass when the allowed directories do not end with a path separator. This occurs because the check relies on a raw string prefix comparison. This is fixed in versions 1.3.2, 2.1.1 and 3.1.1. | |
| Title | IPX is Vulnerable to Path Traversal via Prefix Matching Bypass | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-05T14:11:59.162Z
Reserved: 2025-07-21T16:12:20.734Z
Link: CVE-2025-54387
Updated: 2025-08-05T14:11:49.328Z
Status : Analyzed
Published: 2025-08-05T01:15:41.557
Modified: 2025-10-09T17:32:06.443
Link: CVE-2025-54387
No data.
OpenCVE Enrichment
Updated: 2025-08-05T11:38:46Z
EUVD
Github GHSA