elysia-cors Origin Validation Error
Moderate severity
GitHub Reviewed
Published
Aug 20, 2025
to the GitHub Advisory Database
•
Updated Aug 20, 2025
Description
Published by the National Vulnerability Database
Aug 20, 2025
Published to the GitHub Advisory Database
Aug 20, 2025
Reviewed
Aug 20, 2025
Last updated
Aug 20, 2025
An Origin Validation Error in the elysia-cors library thru 1.3.0 allows attackers to bypass Cross-Origin Resource Sharing (CORS) restrictions. The library incorrectly validates the supplied origin by checking if it is a substring of any domain in the site's CORS policy, rather than performing an exact match. For example, a malicious origin like "notexample.com", "example.common.net" is whitelisted when the site's CORS policy specifies "example.com." This vulnerability enables unauthorized access to user data on sites using the elysia-cors library for CORS validation.
References