Home

Description

An Origin Validation Error in the elysia-cors library thru 1.3.0 allows attackers to bypass Cross-Origin Resource Sharing (CORS) restrictions. The library incorrectly validates the supplied origin by checking if it is a substring of any domain in the site's CORS policy, rather than performing an exact match. For example, a malicious origin like "notexample.com", "example.common.net" is whitelisted when the site's CORS policy specifies "example.com." This vulnerability enables unauthorized access to user data on sites using the elysia-cors library for CORS validation.

PUBLISHED Reserved 2025-06-16 | Published 2025-08-20 | Updated 2025-08-21 | Assigner mitre

References

elysiajs.com

github.com/elysiajs/elysia-cors/blob/main/src/index.ts

github.com/elysiajs/elysia-cors/tree/main

medium.com/...ass-in-popular-opensource-library-ad27fb41e16a

cve.org (CVE-2025-50864)

nvd.nist.gov (CVE-2025-50864)

Download JSON