CVE-2026-25754

7.2 HIGH

📋 TL;DR

A prototype pollution vulnerability in AdonisJS multipart form-data parsing allows remote attackers to manipulate object prototypes at runtime. This could lead to denial of service, data corruption, or remote code execution. All AdonisJS applications using vulnerable versions are affected.

💻 Affected Systems

Products:
  • AdonisJS
  • AdonisJS Bodyparser
Versions: All versions prior to 10.1.3 and 11.0.0-next.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any AdonisJS application processing multipart form-data with vulnerable bodyparser versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or service disruption.

🟠

Likely Case

Denial of service, application instability, or data corruption through prototype manipulation.

🟢

If Mitigated

Limited impact with proper input validation and security controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted multipart form-data payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.3 or 11.0.0-next.9

Vendor Advisory: https://github.com/adonisjs/core/security/advisories/GHSA-f5x2-vj4h-vg4c

Restart Required: Yes

Instructions:

1. Update AdonisJS bodyparser package to version 10.1.3 or 11.0.0-next.9. 2. Run npm update @adonisjs/bodyparser. 3. Restart the application server.

🔧 Temporary Workarounds

Input Validation Middleware

all

Implement custom middleware to validate and sanitize multipart form-data inputs before processing.

Rate Limiting

all

Implement rate limiting on form submission endpoints to reduce attack surface.

🧯 If You Can't Patch

  • Implement WAF rules to block suspicious multipart form-data patterns.
  • Disable or restrict multipart form-data endpoints if not required.

🔍 How to Verify

Check if Vulnerable:

Check package.json for @adonisjs/bodyparser version. Vulnerable if version <10.1.3 or between 11.0.0-next.1 and 11.0.0-next.8.

Check Version:

npm list @adonisjs/bodyparser

Verify Fix Applied:

Verify @adonisjs/bodyparser version is 10.1.3 or 11.0.0-next.9 in package.json and node_modules.

📡 Detection & Monitoring

Log Indicators:

  • Unusual multipart form-data submissions
  • Application crashes or errors during form processing
  • Suspicious payload patterns in request logs

Network Indicators:

  • Large or malformed multipart form-data requests
  • Repeated form submissions with unusual parameters

SIEM Query:

source="application_logs" AND ("multipart" OR "form-data") AND (error OR crash OR exception)

🔗 References

📤 Share & Export