Description
The approach used to check whether a path is within allowed directories is vulnerable to path prefix bypass when the allowed directories do not end with a path separator. This occurs because the check relies on a raw string prefix comparison.
Recommendation
Update the ipx package to the latest compatible version. Followings are version details:
Affected version(s): **>= 3.0.0, < 3.1.1 >= 2.0.0-0, < 2.1.1 < 1.3.2** Patched version(s): **3.1.1 2.1.1 1.3.2**
References
Related Issues
- vite allows server.fs.deny bypass via backslash on Windows - CVE-2025-62522
- qs's arrayLimit bypass in its bracket notation allows DoS via memory exhaustion - CVE-2025-15284
- hemmelig allows SSRF Filter bypass via Secret Request functionality - CVE-2025-69206
- React Router has Path Traversal in File Session Storage (GHSA-9583-h5hc-x8cw) - CVE-2025-61686
- Tags:
- npm
- ipx
Anything's wrong? Let us know Last updated on August 05, 2025