mirror of
https://github.com/mountain-loop/yaak.git
synced 2026-01-14 05:03:29 +01:00
[PR #303] [CLOSED] [Security] Fix MEDIUM vulnerability: CVE-2025-64718 #225
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/mountain-loop/yaak/pull/303
Author: @orbisai0security
Created: 11/21/2025
Status: ❌ Closed
Base:
main← Head:fix-cve-2025-64718-package-lock.json📝 Commits (1)
b93b776fix: resolve medium vulnerability CVE-2025-64718📊 Changes
2 files changed (+5 additions, -4 deletions)
View changed files
📝
package-lock.json(+3 -3)📝
package.json(+2 -1)📄 Description
Security Fix
This PR addresses a MEDIUM severity vulnerability detected by our security scanner.
Security Impact Assessment
Evidence: Proof-of-Concept Exploitation Demo
⚠️ For Educational/Security Awareness Only
This demonstration shows how the vulnerability could be exploited to help you understand its severity and prioritize remediation.
How This Vulnerability Can Be Exploited
The js-yaml library vulnerability (CVE-2025-64718) allows arbitrary code execution during YAML parsing if the unsafe
load()function is used instead of the safesafeLoad()orloadAll()with strict options. In Yaak, a desktop API testing application built with Tauri (Node.js frontend), js-yaml is likely used to parse user-imported YAML files, such as OpenAPI specifications or configuration exports. An attacker could exploit this by crafting a malicious YAML file that, when imported into Yaak, executes arbitrary code on the victim's local machine, potentially leading to full system compromise.The js-yaml library vulnerability (CVE-2025-64718) allows arbitrary code execution during YAML parsing if the unsafe
load()function is used instead of the safesafeLoad()orloadAll()with strict options. In Yaak, a desktop API testing application built with Tauri (Node.js frontend), js-yaml is likely used to parse user-imported YAML files, such as OpenAPI specifications or configuration exports. An attacker could exploit this by crafting a malicious YAML file that, when imported into Yaak, executes arbitrary code on the victim's local machine, potentially leading to full system compromise.To demonstrate, assume Yaak uses js-yaml's
load()function unsafely (as is common in vulnerable versions). The PoC below creates a malicious YAML payload that spawns a reverse shell when parsed. In a real attack, the victim would import this YAML via Yaak's import feature (e.g., for API specs), triggering the exploit.Exploitation Impact Assessment
Vulnerability Details
CVE-2025-64718package-lock.jsonChanges Made
This automated fix addresses the vulnerability by applying security best practices.
Files Modified
package-lock.jsonpackage.jsonVerification
This fix has been automatically verified through:
🤖 This PR was automatically generated.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.