CVE-2025-66030 — Integer Overflow or Wraparound in Forge
CWE-190 — Integer Overflow or WraparoundCWE-295 — Improper Certificate Validation10 documents7 sources
Severity
6.3MEDIUMNVD
EPSS
0.0%
top 85.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 26
Latest updateMar 26
Description
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Packages3 packages
Patches
🔴Vulnerability Details
5GHSA▶
Forge has a basicConstraints bypass in its certificate chain verification (RFC 5280 violation)↗2026-03-26
OSV▶
Forge has a basicConstraints bypass in its certificate chain verification (RFC 5280 violation)↗2026-03-26
OSV▶
CVE-2025-66030: Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript↗2025-11-26
📋Vendor Advisories
4Debian▶
CVE-2025-66030: node-node-forge - Forge (also called `node-forge`) is a native implementation of Transport Layer S...↗2025