CVE-2025-3194:
bigint-buffer Vulnerable to Buffer Overflow via toBigIntLE() Function
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.1766%
CWE
Published
4/4/2025
Updated
4/4/2025
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
bigint-buffer | npm | <= 1.1.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability reports consistently point to the toBigIntLE
function as the source of the buffer overflow vulnerability. The function's implementation in index.ts
shows it performs buffer operations without proper input validation or size checking. When examining the source code, we can see the function takes a Buffer
parameter and performs operations on it without any size validation, which matches the classic buffer overflow pattern (CWE-120). The vulnerability manifests when this function processes malicious or malformed input buffers.