#VU113173 Use of insufficiently random values in form-data - CVE-2025-7783


| Updated: 2025-08-15

Vulnerability identifier: #VU113173

Vulnerability risk: Medium

CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-7783

CWE-ID: CWE-330

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
form-data
Web applications / JS libraries

Vendor: FormData

Description

The vulnerability allows a remote attacker to perform parameter injection attacks.

The vulnerability exists due to software uses a weak Math.random() method to generated random values for multipart form-encoded data. A remote attacker can observe values produced by Math.random in the target application and predict the random number used to generate form-data's boundary value and inject arbitrary parameters into requests. 

Mitigation
Install updates from vendor's website.

Vulnerable software versions

form-data: 2.0.0, 2.1.0 - 2.1.4, 2.2.0, 2.3.0 - 2.3.2, 2.4.0, 2.5.0 - 2.5.4, 3.0.0 - 3.0.4, 4.0.0 - 4.0.4


External links
https://github.com/form-data/form-data/commit/3d1723080e6577a66f17f163ecd345a21d8d0fd0
https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability