CVE-2025-70347

5.5 MEDIUM

📋 TL;DR

A vulnerability in mquickjs allows local attackers to cause denial of service by providing a specially crafted file to the get_mblock_size function. This affects systems running vulnerable versions of mquickjs where local users can submit files for processing. The issue requires local access to exploit.

💻 Affected Systems

Products:
  • mquickjs
Versions: All versions before commit 74b7e (2026-01-15)
Operating Systems: All operating systems running mquickjs
Default Config Vulnerable: ⚠️ Yes
Notes: Any system using mquickjs with file processing capabilities is vulnerable if running affected versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of applications using mquickjs, potentially crashing the entire process and affecting dependent services.

🟠

Likely Case

Local denial of service affecting the specific mquickjs process, requiring restart of affected applications.

🟢

If Mitigated

Minimal impact with proper access controls limiting local user privileges and file upload restrictions.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users with access to submit files to mquickjs could disrupt services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to submit crafted files to the vulnerable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 74b7e and later (2026-01-15+)

Vendor Advisory: https://github.com/bellard/mquickjs/issues/56

Restart Required: Yes

Instructions:

1. Update mquickjs to commit 74b7e or later. 2. Rebuild any applications using mquickjs. 3. Restart affected services.

🔧 Temporary Workarounds

Restrict file upload permissions

linux

Limit which local users can submit files to mquickjs processes

chmod 750 /path/to/mquickjs/directories
setfacl -m u:trusteduser:rwx /path/to/mquickjs

Implement file validation

all

Add input validation for files before passing to mquickjs

🧯 If You Can't Patch

  • Implement strict access controls to limit which local users can interact with mquickjs
  • Monitor for abnormal process crashes and implement automatic restart mechanisms

🔍 How to Verify

Check if Vulnerable:

Check mquickjs version: git log --oneline | grep -i '74b7e' - if not found, vulnerable

Check Version:

git log --oneline | head -1

Verify Fix Applied:

Verify commit 74b7e is present: git log --oneline | grep '74b7e'

📡 Detection & Monitoring

Log Indicators:

  • Process crashes of mquickjs
  • Segmentation fault errors in system logs
  • Abnormal termination of services using mquickjs

Network Indicators:

  • No network indicators - local exploit only

SIEM Query:

process_name:"mquickjs" AND event_type:"process_crash"

🔗 References

📤 Share & Export