Insufficient RNG in form-data < 4.0.4 enables HTTP Parameter Pollution
CVE-2025-7783 Published on July 18, 2025

Usage of unsafe random function in form-data for choosing boundary
Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.

Github Repository Github Repository NVD

Weakness Type

Use of Insufficiently Random Values

The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers. When software generates predictable values in a context requiring unpredictability, it may be possible for an attacker to guess the next value that will be generated, and use this guess to impersonate another user or access sensitive information.


Vulnerable Packages

The following package name and versions may be associated with CVE-2025-7783

Package Manager Vulnerable Package Versions Fixed In
npm form-data < 2.5.4 2.5.4
npm form-data >= 3.0.0, < 3.0.4 3.0.4
npm form-data >= 4.0.0, < 4.0.4 4.0.4
npm axios = 1.10.0 1.11.0

Exploit Probability

EPSS
0.18%
Percentile
38.99%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.