node-forge <1.3.1 ASN.1 Conflict (CWE-436) Allows Auth Bypass
CVE-2025-12816 Published on November 25, 2025
CVE-2025-12816
An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions.
Vulnerability Analysis
CVE-2025-12816 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity, and no impact on availability.
Weakness Type
Interpretation Conflict
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state. This is generally found in proxies, firewalls, anti-virus software, and other intermediary devices that monitor, allow, deny, or modify traffic based on how the client or server is expected to behave.
Products Associated with CVE-2025-12816
Want to know whenever a new CVE is published for Oracle? stack.watch will email you.
Affected Versions
Digital Bazaar node-forge:- Before and including 1.3.1 is affected.
- Before and including 1.3.1 is affected.
Vulnerable Packages
The following package name and versions may be associated with CVE-2025-12816
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| npm | node-forge | < 1.3.2 | 1.3.2 |
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.