We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54884

Vision UI security-kit.js: Potential Uncontrolled Resource Allocation Vulnerability



Description

Vision UI is a collection of enterprise-grade, dependency-free modules for modern web projects. In versions 1.4.0 and below, the generateSecureId and getSecureRandomInt functions in security-kit versions prior to 3.5.0 (packaged in Vision UI 1.4.0 and below) are vulnerable to Denial of Service (DoS) attacks. The generateSecureId(length) function directly used the length parameter to size a Uint8Array buffer, allowing attackers to exhaust server memory through repeated requests for large IDs since the previous 1024 limit was insufficient. The getSecureRandomInt(min, max) function calculated buffer size based on the range between min and max, where large ranges caused excessive memory allocation and CPU-intensive rejection-sampling loops that could hang the thread. This issue is fixed in version 1.5.0.

Reserved 2025-07-31 | Published 2025-08-05 | Updated 2025-08-05 | Assigner GitHub_M


HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-400: Uncontrolled Resource Consumption

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 1.5.0
affected

References

github.com/...ion-ui/security/advisories/GHSA-gg28-wc2c-jjj3

github.com/...ommit/74802cd688b661a35e638fc96938d65ca7c05ff5

github.com/DavidOsipov/Vision-ui/releases/tag/1.5.0

cve.org (CVE-2025-54884)

nvd.nist.gov (CVE-2025-54884)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54884

Support options

Helpdesk Chat, Email, Knowledgebase