CVE-2025-62378 (CNNVD-202510-2098)

MEDIUM
中文标题:
commandKit 安全漏洞
英文标题:
CommandKit exposes incorrect command name in context object for message command aliases
CVSS分数: 6.1
发布时间: 2025-10-15 17:02:02
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

commandKit是Under Ctrl开源的一个构建Discord机器人的开发工具。 commandKit 1.2.0-rc.1版本至1.2.0-rc.11版本存在安全漏洞,该漏洞源于消息命令处理程序中存在逻辑缺陷,可能导致未经授权的命令执行或不准确的访问控制决策。

英文描述:

CommandKit is the discord.js meta-framework for building Discord bots. In versions 1.2.0-rc.1 through 1.2.0-rc.11, a logic flaw exists in the message command handler that affects how the commandName property is exposed to both middleware functions and command execution contexts when handling command aliases. When a message command is invoked using an alias, the ctx.commandName value reflects the alias rather than the canonical command name. This occurs in both middleware functions and within the command's own run function. Although not explicitly documented, CommandKit's examples and guidance around middleware usage implicitly convey that ctx.commandName represents the canonical command identifier. Middleware examples in the documentation consistently use ctx.commandName to reference the command being executed. Developers who assume ctx.commandName is canonical may introduce unintended behavior when relying on it for logic such as permission checks, rate limiting, or audit logging. This could allow unauthorized command execution or inaccurate access control decisions. Slash commands and context menu commands are not affected. This issue has been patched in version 1.2.0-rc.12, where ctx.commandName now consistently returns the actual canonical command name regardless of the alias used to invoke it.

CWE类型:
CWE-706
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
underctrl-io commandkit >= 1.2.0-rc.1 < 1.2.0-rc.12 - - cpe:2.3:a:underctrl-io:commandkit:>=_1.2.0-rc.1_<_1.2.0-rc.12:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/underctrl-io/commandkit/security/advisories/GHSA-fhwm-pc6r-4h2f x_refsource_CONFIRM
cve.org
访问
CVSS评分详情
3.1 (cna)
MEDIUM
6.1
CVSS向量: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
机密性
LOW
完整性
HIGH
可用性
NONE
时间信息
发布时间:
2025-10-15 17:02:02
修改时间:
2025-10-15 17:13:21
创建时间:
2025-11-11 15:40:48
更新时间:
2025-11-11 16:00:17
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-62378 2025-11-11 15:23:33 2025-11-11 07:40:48
NVD nvd_CVE-2025-62378 2025-11-11 15:01:06 2025-11-11 07:48:35
CNNVD cnnvd_CNNVD-202510-2098 2025-11-11 15:13:00 2025-11-11 08:00:17
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:17
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202510-2098; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202510-2098
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:35
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']