Company Details
openjs-foundation
30
9,269
5415
github.com
0
OPE_1837356
In-progress

OpenJS Foundation Company CyberSecurity Posture
github.comThe mission of the OpenJS Foundation is to support the healthy growth of JavaScript and web technologies by providing a neutral organization to host and sustain projects, as well as collaboratively fund activities that benefit the ecosystem as a whole. The OpenJS Foundation is made up of 32 open source JavaScript projects including Appium, Dojo, jQuery, Node.js, and webpack.
Company Details
openjs-foundation
30
9,269
5415
github.com
0
OPE_1837356
In-progress
Between 700 and 749

OpenJS Foundation Global Score (TPRM)XXXX

Description: The ‘node-forge’ package, a pivotal cryptography library for JavaScript, is facing a significant security vulnerability. This flaw could potentially allow bad actors to bypass signature verifications through specially-crafted data, posing severe risks to applications relying on this package. Examining the Impact of the ‘node-forge’ Vulnerability The discovered vulnerability in the ‘node-forge’ library is raising concerns within the cybersecurity community. Security experts highlight the potential for attackers to manipulate data, tricking systems into accepting altered information as legitimate. The widespread use of ‘node-forge’ in various applications underscores the broad implications of this security flaw. How the Vulnerability Affects Signature Verification At the heart of the problem is the ability to craft data that seems valid, successfully evading signature authentications. This issue allows cybercriminals to create seemingly genuine signatures, compromising data integrity and authenticity. The critical nature of this vulnerability lies in its potential to disrupt security protocols that depend on ‘node-forge’ for encryption and decryption processes. Potential Consequences for Applications Using ‘node-forge’ Applications integrating ‘node-forge’ face the possibility of data breaches through unauthorized access. The risk extends to all sectors utilizing JavaScript for their digital services, as the trustworthiness of digital signatures is paramount for secure tr
Description: The Node.js project disclosed **CVE-2025-23166**, a high-severity vulnerability in its core cryptographic operations that enables remote attackers to crash Node.js processes, leading to **widespread denial-of-service (DoS) outages**. The flaw stems from improper error handling in `SignTraits::DeriveBits()`, allowing adversaries to exploit untrusted inputs in asynchronous cryptographic functions—critical for authentication, data protection, and secure communications. Exploitation disrupts business operations, halts mission-critical services, and risks cascading failures across internet-exposed applications.All active Node.js release lines (20.x, 22.x, 23.x, 24.x) and EOL versions are affected, with unpatched systems remaining perpetually vulnerable. The advisory warns of **immediate service disruptions**, threatening operational continuity for millions of users reliant on Node.js-based platforms. While patches (20.19.2, 22.15.1, 23.11.1, 24.0.2) are available, delayed updates expose organizations to **remote crashes, financial losses from downtime, and reputational damage** due to unreliable services. The vulnerability’s severity is amplified by its foundational role in web infrastructure, making it a prime target for malicious actors seeking large-scale disruption.


OpenJS Foundation has 270.37% more incidents than the average of same-industry companies with at least one recorded incident.
OpenJS Foundation has 212.5% more incidents than the average of all companies with at least one recorded incident.
OpenJS Foundation reported 2 incidents this year: 0 cyber attacks, 0 ransomware, 2 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
OpenJS Foundation cyber incidents detection timeline including parent company and subsidiaries

The mission of the OpenJS Foundation is to support the healthy growth of JavaScript and web technologies by providing a neutral organization to host and sustain projects, as well as collaboratively fund activities that benefit the ecosystem as a whole. The OpenJS Foundation is made up of 32 open source JavaScript projects including Appium, Dojo, jQuery, Node.js, and webpack.


GDIT is a global technology and professional services company that delivers solutions, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solut

We have the world’s best talent that design, run, and manage the most advanced and reliable technology infrastructure each day. Together, we think holistically about the health of these vital technology ecosystems. We are a focused, independent company that builds on our foundation of excellence by
For over 70 years, Iron Mountain Incorporated (NYSE: IRM) has been your strategic partner to care for your information and assets. A global leader in storage and information management services and trusted by more than 225,000 organizations around the world, including 95% of the Fortune 1000, we pro

We make the experience of travel better for everyone, everywhere by inspiring innovation, partnerships and responsibility to people, places and planet. Our technology powers the travel and tourism industry. We inspire more connected ways of thinking, centered around the traveler. Our platform c
Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including systems integration, managed services infrastructure, cloud solutions, business applications, customer experience, and intelligent security solutions. We p

Almaviva is synonymous with digital innovation. Proven experience, unique skills, ongoing research and in-depth knowledge of a range of public and private market sectors are what make it the leading Italian Group in Information & Communications Technology. Almaviva leads the Country growth and take

Reply [EXM, STAR: REY] specialises in the design and implementation of solutions based on new communication channels and digital media. As a network of highly specialised companies, Reply defines and develops business models enabled by the new models of AI, big data, cloud computing, digital media a

Luxoft, a DXC Technology Company (NYSE: DXC), is a digital strategy and software engineering firm providing bespoke technology solutions that drive business change for customers the world over. Acquired by U.S. company DXC Technology in 2019, Luxoft is a global operation in 44 cities and 21 countrie

Tata Elxsi is amongst the world’s leading providers of design and technology services across industries, including Automotive, Media & Entertainment, Communications, and Healthcare. Tata Elxsi is helping customers reimagine their products and services through design thinking and the application of d
.png)
OSSF developed warning system to protect open source maintainers, developers from social engineering, active exploits.
Dana Wang discusses the most significant barriers to improving OSS security and opportunities for overcoming these challenges.
The XZ utils backdoor represents a turning point for open source security and is already sending shockwaves through the industry and beyond.
Federal officials are said to be investigating potential links between the recent XZ Utils campaign and new threat activity against...
Security researchers uncover a "credible" takeover attempt on the OpenJS Foundation, mirroring a recent incident with XZ Utils.
The alert comes just after a possible nation state entity attempted to hijack an open-source Linux tool last month.
Open source groups warn of sophisticated social engineering attacks targeting JavaScript and other critical projects All IT news on...
The recent attempt by an unknown actor to sabotage a widely used software program may have been one of several attempts to subvert key...
The thwarted social engineering attempts highlight the urgent need to address weaknesses in the management of open source software.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of OpenJS Foundation is https://github.com/openjs-foundation.
According to Rankiteo, OpenJS Foundation’s AI-generated cybersecurity score is 744, reflecting their Moderate security posture.
According to Rankiteo, OpenJS Foundation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, OpenJS Foundation is not certified under SOC 2 Type 1.
According to Rankiteo, OpenJS Foundation does not hold a SOC 2 Type 2 certification.
According to Rankiteo, OpenJS Foundation is not listed as GDPR compliant.
According to Rankiteo, OpenJS Foundation does not currently maintain PCI DSS compliance.
According to Rankiteo, OpenJS Foundation is not compliant with HIPAA regulations.
According to Rankiteo,OpenJS Foundation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
OpenJS Foundation operates primarily in the IT Services and IT Consulting industry.
OpenJS Foundation employs approximately 30 people worldwide.
OpenJS Foundation presently has no subsidiaries across any sectors.
OpenJS Foundation’s official LinkedIn profile has approximately 9,269 followers.
OpenJS Foundation is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, OpenJS Foundation does not have a profile on Crunchbase.
Yes, OpenJS Foundation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/openjs-foundation.
As of November 27, 2025, Rankiteo reports that OpenJS Foundation has experienced 2 cybersecurity incidents.
OpenJS Foundation has an estimated 36,305 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.