Insufficient RNG in form-data < 4.0.4 enables HTTP Parameter Pollution
CVE-2025-7783 Published on July 18, 2025
Usage of unsafe random function in form-data for choosing boundary
Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js.
This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
Weakness Type
Use of Insufficiently Random Values
The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers. When software generates predictable values in a context requiring unpredictability, it may be possible for an attacker to guess the next value that will be generated, and use this guess to impersonate another user or access sensitive information.
Vulnerable Packages
The following package name and versions may be associated with CVE-2025-7783
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| npm | form-data | < 2.5.4 | 2.5.4 |
| npm | form-data | >= 3.0.0, < 3.0.4 | 3.0.4 |
| npm | form-data | >= 4.0.0, < 4.0.4 | 4.0.4 |
| npm | axios | = 1.10.0 | 1.11.0 |
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.