CVE-2025-54387
Severity CVSS v4.0:
MEDIUM
Type:
CWE-22
Path Traversal
Publication date:
05/08/2025
Last modified:
09/10/2025
Description
IPX is an image optimizer powered by sharp and svgo. In versions 1.3.1 and below, 2.0.0-0 through 2.1.0, and 3.0.0 through 3.1.0, the approach used to check whether a path is within allowed directories is vulnerable to path prefix bypass when the allowed directories do not end with a path separator. This occurs because the check relies on a raw string prefix comparison. This is fixed in versions 1.3.2, 2.1.1 and 3.1.1.
Impact
Base Score 4.0
6.90
Severity 4.0
MEDIUM
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:unjs:ipx:*:*:*:*:*:node.js:*:* | 1.3.2 (excluding) | |
| cpe:2.3:a:unjs:ipx:*:*:*:*:*:node.js:*:* | 2.0.0 (including) | 2.1.1 (excluding) |
| cpe:2.3:a:unjs:ipx:*:*:*:*:*:node.js:*:* | 3.0.0 (including) | 3.1.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/unjs/ipx/commit/81693ddbfc062cc922e4e2406e8427ab4e3ad214
- https://github.com/unjs/ipx/releases/tag/v1.3.2
- https://github.com/unjs/ipx/releases/tag/v2.1.1
- https://github.com/unjs/ipx/releases/tag/v3.1.1
- https://github.com/unjs/ipx/security/advisories/GHSA-mm3p-j368-7jcr
- https://github.com/unjs/ipx/security/advisories/GHSA-mm3p-j368-7jcr



