We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54387

IPX is Vulnerable to Path Traversal via Prefix Matching Bypass



Description

IPX is an image optimizer powered by sharp and svgo. In versions 1.3.1 and below, 2.0.0-0 through 2.1.0, and 3.0.0 through 3.1.0, the approach used to check whether a path is within allowed directories is vulnerable to path prefix bypass when the allowed directories do not end with a path separator. This occurs because the check relies on a raw string prefix comparison. This is fixed in versions 1.3.2, 2.1.1 and 3.1.1.

Reserved 2025-07-21 | Published 2025-08-05 | Updated 2025-08-05 | Assigner GitHub_M


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:L/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 1.3.2
affected

>= 2.0.0-0, < 2.1.1
affected

>= 3.0.0, < 3.1.1
affected

References

github.com/unjs/ipx/security/advisories/GHSA-mm3p-j368-7jcr

github.com/...ommit/81693ddbfc062cc922e4e2406e8427ab4e3ad214

github.com/unjs/ipx/releases/tag/v1.3.2

github.com/unjs/ipx/releases/tag/v2.1.1

github.com/unjs/ipx/releases/tag/v3.1.1

cve.org (CVE-2025-54387)

nvd.nist.gov (CVE-2025-54387)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54387

Support options

Helpdesk Chat, Email, Knowledgebase