Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7j2x-32w6-p43p | SVG Dimension Capping Bypass via XML Comment Injection in @dicebear/converter ensureSize() |
Tue, 24 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dicebear
Dicebear dicebear |
|
| CPEs | cpe:2.3:a:dicebear:dicebear:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dicebear
Dicebear dicebear |
Tue, 24 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DiceBear is an avatar library for designers and developers. Prior to version 9.4.2, the `ensureSize()` function in `@dicebear/converter` used a regex-based approach to rewrite SVG `width`/`height` attributes, capping them at 2048px to prevent denial of service. This size capping could be bypassed by crafting SVG input that causes the regex to match a non-functional occurrence of `<svg` before the actual SVG root element. When the SVG is subsequently rendered via `@resvg/resvg-js` on the Node.js code path, it renders at the attacker-specified dimensions, potentially causing out-of-memory crashes. In version 9.4.2, the regex-based approach has been replaced with XML-aware processing using `fast-xml-parser` to correctly identify and modify the SVG root element's attributes. Additionally, a `fitTo` constraint has been added to the `renderAsync` call as defense-in-depth, ensuring the rendered output is always bounded regardless of SVG content. | |
| Title | @dicebear/converter ensureSize() Vulnerable to SVG Dimension Capping Bypass via XML Comment Injection | |
| Weaknesses | CWE-185 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T15:11:51.489Z
Reserved: 2026-03-19T18:45:22.431Z
Link: CVE-2026-33418
Updated: 2026-03-24T14:10:35.938Z
Status : Analyzed
Published: 2026-03-24T14:16:30.453
Modified: 2026-03-24T19:19:48.480
Link: CVE-2026-33418
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:50:13Z
Github GHSA