CVE-2025-62494 Affecting quickjs package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-QUICKJS-13601373
  • published17 Oct 2025
  • disclosed16 Oct 2025

Introduced: 16 Oct 2025

NewCVE-2025-62494  (opens in a new tab)

How to fix?

There is no fixed version for Debian:13 quickjs.

NVD Description

Note: Versions mentioned in the description apply only to the upstream quickjs package and not the quickjs package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

A type confusion vulnerability exists in the handling of the string addition (+) operation within the QuickJS engine.

  • The code first checks if the left-hand operand is a string.

  • It then attempts to convert the right-hand operand to a primitive value using JS_ToPrimitiveFree. This conversion can trigger a callback (e.g., toString or valueOf).

  • During this callback, an attacker can modify the type of the left-hand operand in memory, changing it from a string to a different type (e.g., an object or an array).

  • The code then proceeds to call JS_ConcatStringInPlace, which still treats the modified left-hand value as a string.

This mismatch between the assumed type (string) and the actual type allows an attacker to control the data structure being processed by the concatenation logic, resulting in a type confusion condition. This can lead to out-of-bounds memory access, potentially resulting in memory corruption and arbitrary code execution in the context of the QuickJS runtime.