Integer Overflow Vulnerability in QuickJS Regular Expression Engine
CVE-2025-62495
7.1HIGH
What is CVE-2025-62495?
An integer overflow vulnerability exists in the QuickJS regular expression engine's handling of bytecode buffer sizes. When a large or complex regular expression exceeds the positive limits of a signed 32-bit integer, it can cause a wrap-around, resulting in a negative value that is used in offset calculations. This miscalculation allows for out-of-bounds writes, potentially leading to memory corruption or execution of arbitrary code.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
QuickJS 2025-04-26 < 2025-09-13
References
CVSS V4
Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Google Big Sleep
