icon

We found results for “

CVE-2025-66453

Good to know:

icon
icon
icon

Date: December 3, 2025

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Severity Score

Severity Score

Weakness Type (CWE)

Uncontrolled Resource Consumption

CWE-400

Top Fix

icon

Upgrade Version

Upgrade to version org.mozilla:rhino:1.8.1;org.mozilla:rhino:1.7.14.1;org.mozilla:rhino:1.7.15.1;https://github.com/mozilla/rhino.git - Rhino1_7_14_1_Release;https://github.com/mozilla/rhino.git - Rhino1_7_15_1_Release;https://github.com/mozilla/rhino.git - Rhino1_8_1_Release

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): LOW

Do you need more information?

Contact Us