Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. happy-dom
  4. ›
  5. CVE-2025-61927

CVE-2025-61927: Happy DOM: VM Context Escape can lead to Remote Code Execution

October 10, 2025 (updated November 10, 2025)

Happy DOM v19 and lower contains a security vulnerability that puts the owner system at the risk of RCE (Remote Code Execution) attacks.

A Node.js VM Context is not an isolated environment, and if the user runs untrusted JavaScript code within the Happy DOM VM Context, it may escape the VM and get access to process level functionality.

It seems like what the attacker can get control over depends on if the process is using ESM or CommonJS. With CommonJS the attacker can get hold of the require() function to import modules.

Happy DOM has JavaScript evaluation enabled by default. This may not be obvious to the consumer of Happy DOM and can potentially put the user at risk if untrusted code is executed within the environment.

References

  • github.com/advisories/GHSA-37j7-fg3j-429f
  • github.com/capricorn86/happy-dom
  • github.com/capricorn86/happy-dom/commit/819d15ba289495439eda8be360d92a614ce22405
  • github.com/capricorn86/happy-dom/commit/de438ad72921c69793584aa657b48d3655dfac97
  • github.com/capricorn86/happy-dom/releases/tag/v20.0.0
  • github.com/capricorn86/happy-dom/security/advisories/GHSA-37j7-fg3j-429f
  • nvd.nist.gov/vuln/detail/CVE-2025-61927

Code Behaviors & Features

Detect and mitigate CVE-2025-61927 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 20.0.0

Fixed versions

  • 20.0.0

Solution

Upgrade to version 20.0.0 or above.

Impact 10 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

npm/happy-dom/CVE-2025-61927.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 07 Dec 2025 12:18:19 +0000.