| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7j2x-32w6-p43p | SVG Dimension Capping Bypass via XML Comment Injection in @dicebear/converter ensureSize() |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dicebear
Dicebear dicebear |
|
| CPEs | cpe:2.3:a:dicebear:dicebear:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dicebear
Dicebear dicebear |
Tue, 24 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DiceBear is an avatar library for designers and developers. Prior to version 9.4.2, the `ensureSize()` function in `@dicebear/converter` used a regex-based approach to rewrite SVG `width`/`height` attributes, capping them at 2048px to prevent denial of service. This size capping could be bypassed by crafting SVG input that causes the regex to match a non-functional occurrence of `<svg` before the actual SVG root element. When the SVG is subsequently rendered via `@resvg/resvg-js` on the Node.js code path, it renders at the attacker-specified dimensions, potentially causing out-of-memory crashes. In version 9.4.2, the regex-based approach has been replaced with XML-aware processing using `fast-xml-parser` to correctly identify and modify the SVG root element's attributes. Additionally, a `fitTo` constraint has been added to the `renderAsync` call as defense-in-depth, ensuring the rendered output is always bounded regardless of SVG content. | |
| Title | @dicebear/converter ensureSize() Vulnerable to SVG Dimension Capping Bypass via XML Comment Injection | |
| Weaknesses | CWE-185 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T15:11:51.489Z
Reserved: 2026-03-19T18:45:22.431Z
Link: CVE-2026-33418
Updated: 2026-03-24T14:10:35.938Z
Status : Analyzed
Published: 2026-03-24T14:16:30.453
Modified: 2026-03-24T19:19:48.480
Link: CVE-2026-33418
No data.
OpenCVE Enrichment
No data.
Github GHSA