{"id":"UBUNTU-CVE-2025-48050","details":"In DOMPurify through 3.2.5 before 6bc6d60, scripts/server.js does not ensure that a pathname is located under the current working directory. NOTE: the Supplier disputes the significance of this report because the \"Uncontrolled data used in path expression\" occurs \"in a development helper script which starts a local web server if needed and must be manually started.\"","modified":"2026-04-27T19:11:18.577087Z","published":"2025-05-15T16:15:00Z","upstream":["CVE-2025-48050"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-48050"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2025-48050"},{"type":"REPORT","url":"https://github.com/odaysec/advisory/blob/main/cure53/DOMPurify/writeup.md"},{"type":"REPORT","url":"https://github.com/cure53/DOMPurify/pull/1101"},{"type":"REPORT","url":"https://github.com/cure53/DOMPurify/commit/e9afd609397aa31b0747a766504f698fcb6ad0f7"},{"type":"REPORT","url":"https://github.com/cure53/DOMPurify/commit/6bc6d60e49256f27a4022181b7d8a5b0721fd534"}],"affected":[{"package":{"name":"node-dompurify","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/node-dompurify@2.3.3+dfsg-1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.3.0+dfsg-2","2.3.3+dfsg-1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.3.3+dfsg-1","binary_name":"node-dompurify"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-48050.json"}},{"package":{"name":"node-dompurify","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/node-dompurify@3.0.9+dfsg+~3.0.5-1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.4.1+dfsg+~2.4.0-1","3.0.9+dfsg+~3.0.5-1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.0.9+dfsg+~3.0.5-1","binary_name":"node-dompurify"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-48050.json"}},{"package":{"name":"node-dompurify","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/node-dompurify@3.1.7+dfsg+~3.0.5-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.1.7+dfsg+~3.0.5-1","3.1.7+dfsg+~3.0.5-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.1.7+dfsg+~3.0.5-2","binary_name":"node-dompurify"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-48050.json"}},{"package":{"name":"node-dompurify","ecosystem":"Ubuntu:26.04","purl":"pkg:deb/ubuntu/node-dompurify@3.3.3+dfsg-1?arch=source&distro=resolute"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.1.7+dfsg+~3.0.5-2","3.3.3+dfsg-1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.3.3+dfsg-1","binary_name":"node-dompurify"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-48050.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}