Skip to content

Commit 3876a70

Browse files
committed
1 parent 84f8ef6 commit 3876a70

1 file changed

Lines changed: 3 additions & 5 deletions

File tree

advisories/github-reviewed/2026/01/GHSA-p5wg-g6qr-c7cg/GHSA-p5wg-g6qr-c7cg.json

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p5wg-g6qr-c7cg",
4-
"modified": "2026-01-29T14:58:17Z",
4+
"modified": "2026-01-29T14:58:19Z",
55
"published": "2026-01-26T18:31:29Z",
66
"aliases": [
77
"CVE-2025-50537"
88
],
9-
"summary": "eslint has a Stack Overflow when serializing objects with circular references",
9+
"summary": "Not a vulnerability",
1010
"details": "There is a Stack Overflow vulnerability in eslint before 9.26.0 when serializing objects with circular references in `eslint/lib/shared/serialization.js`. The exploit is triggered via the `RuleTester.run()` method, which validates test cases and checks for duplicates. During validation, the internal function `checkDuplicateTestCase()` is called, which in turn uses the `isSerializable()` function for serialization checks. When a circular reference object is passed in, `isSerializable()` enters infinite recursion, ultimately causing a Stack Overflow.",
1111
"severity": [
1212
{
@@ -58,9 +58,7 @@
5858
}
5959
],
6060
"database_specific": {
61-
"cwe_ids": [
62-
"CWE-674"
63-
],
61+
"cwe_ids": [],
6462
"severity": "MODERATE",
6563
"github_reviewed": true,
6664
"github_reviewed_at": "2026-01-29T14:58:17Z",

0 commit comments

Comments
 (0)