๐Ÿ” CVE Alert

CVE-2026-33418

HIGH 7.5

@dicebear/converter ensureSize() Vulnerable to SVG Dimension Capping Bypass via XML Comment Injection

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

DiceBear is an avatar library for designers and developers. Prior to version 9.4.2, the `ensureSize()` function in `@dicebear/converter` used a regex-based approach to rewrite SVG `width`/`height` attributes, capping them at 2048px to prevent denial of service. This size capping could be bypassed by crafting SVG input that causes the regex to match a non-functional occurrence of `<svg` before the actual SVG root element. When the SVG is subsequently rendered via `@resvg/resvg-js` on the Node.js code path, it renders at the attacker-specified dimensions, potentially causing out-of-memory crashes. In version 9.4.2, the regex-based approach has been replaced with XML-aware processing using `fast-xml-parser` to correctly identify and modify the SVG root element's attributes. Additionally, a `fitTo` constraint has been added to the `renderAsync` call as defense-in-depth, ensuring the rendered output is always bounded regardless of SVG content.

CWE CWE-185
Vendor dicebear
Product dicebear
Published Mar 24, 2026
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for dicebear dicebear

Be the first to know when new high vulnerabilities affecting dicebear dicebear are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

dicebear / dicebear
< 9.4.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/dicebear/dicebear/security/advisories/GHSA-7j2x-32w6-p43p