Vulnerable Library - express-session-1.15.6.tgz
Path to dependency file: /NodeGoat/package.json
Path to vulnerable library: /NodeGoat/package.json
Found in HEAD commit: 0023dc1436f92133203911e0301ccd06cdb3a9c4
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2025-7339
Vulnerable Library - on-headers-1.0.1.tgz
Execute a listener when a response is about to write headers
Library home page: https://registry.npmjs.org/on-headers/-/on-headers-1.0.1.tgz
Path to dependency file: /NodeGoat/package.json
Path to vulnerable library: /NodeGoat/package.json
Dependency Hierarchy:
- express-session-1.15.6.tgz (Root Library)
- ❌ on-headers-1.0.1.tgz (Vulnerable Library)
Found in HEAD commit: 0023dc1436f92133203911e0301ccd06cdb3a9c4
Found in base branch: main
Reachability Analysis
This vulnerability is potentially reachable
owasp-nodejs-goat-1.3.0/server.js (Application)
-> express-session-1.15.6/index.js (Extension)
-> ❌ on-headers-1.0.1/index.js (Vulnerable Component)
Vulnerability Details
on-headers is a node.js middleware for listening to when a response writes headers. A bug in on-headers versions "<1.1.0" may result in response headers being inadvertently modified when an array is passed to "response.writeHead()". Users should upgrade to version 1.1.0 to receive a patch. Uses are strongly encouraged to upgrade to "1.1.0", but this issue can be worked around by passing an object to "response.writeHead()" rather than an array.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2025-07-17
URL: CVE-2025-7339
CVSS 3 Score Details (3.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Path to dependency file: /NodeGoat/package.json
Path to vulnerable library: /NodeGoat/package.json
Found in HEAD commit: 0023dc1436f92133203911e0301ccd06cdb3a9c4
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - on-headers-1.0.1.tgz
Execute a listener when a response is about to write headers
Library home page: https://registry.npmjs.org/on-headers/-/on-headers-1.0.1.tgz
Path to dependency file: /NodeGoat/package.json
Path to vulnerable library: /NodeGoat/package.json
Dependency Hierarchy:
Found in HEAD commit: 0023dc1436f92133203911e0301ccd06cdb3a9c4
Found in base branch: main
Reachability Analysis
This vulnerability is potentially reachable
Vulnerability Details
on-headers is a node.js middleware for listening to when a response writes headers. A bug in on-headers versions "<1.1.0" may result in response headers being inadvertently modified when an array is passed to "response.writeHead()". Users should upgrade to version 1.1.0 to receive a patch. Uses are strongly encouraged to upgrade to "1.1.0", but this issue can be worked around by passing an object to "response.writeHead()" rather than an array.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2025-07-17
URL: CVE-2025-7339
CVSS 3 Score Details (3.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.