DiceBear is an avatar library for designers and developers. Prior to version 9.4.2, the `ensureSize()` function in `@dicebear/converter` used a regex-based approach to rewrite SVG `width`/`height` attributes, capping them at 2048px to prevent denial of service. This size capping could be bypassed by crafting SVG input that causes the regex to match a non-functional occurrence of `<svg` before the actual SVG root element. When the SVG is subsequently rendered via `@resvg/resvg-js` on the Node.js code path, it renders at the attacker-specified dimensions, potentially causing out-of-memory crashes. In version 9.4.2, the regex-based approach has been replaced with XML-aware processing using `fast-xml-parser` to correctly identify and modify the SVG root element's attributes. Additionally, a `fitTo` constraint has been added to the `renderAsync` call as defense-in-depth, ensuring the rendered output is always bounded regardless of SVG content.
References
| Link | Resource |
|---|---|
| https://github.com/dicebear/dicebear/security/advisories/GHSA-7j2x-32w6-p43p | Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-24 14:16
Updated : 2026-03-24 19:19
NVD link : CVE-2026-33418
Mitre link : CVE-2026-33418
CVE.ORG link : CVE-2026-33418
JSON object : View
Products Affected
dicebear
- dicebear
CWE
CWE-185
Incorrect Regular Expression
