Skip to content

Commit 6927763

Browse files
1 parent 0712fd3 commit 6927763

File tree

1 file changed

+11
-3
lines changed

1 file changed

+11
-3
lines changed

advisories/github-reviewed/2025/09/GHSA-6xv4-9cqp-92rh/GHSA-6xv4-9cqp-92rh.json

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-6xv4-9cqp-92rh",
4-
"modified": "2025-09-29T13:34:17Z",
4+
"modified": "2025-10-30T14:05:30Z",
55
"published": "2025-09-24T18:30:31Z",
66
"aliases": [
77
"CVE-2025-57353"
88
],
99
"summary": "messageformat prototype pollution vulnerability",
10-
"details": "The Runtime components of messageformat package for Node.js prior to version 3.0.1 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle. This issue remains unaddressed in the latest available version.",
10+
"details": "The Runtime components of messageformat package for Node.js version 3.0.1 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle. Version 3.0.2 contains a fix.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V4",
@@ -28,7 +28,7 @@
2828
"introduced": "0"
2929
},
3030
{
31-
"fixed": "3.0.1"
31+
"fixed": "3.0.2"
3232
}
3333
]
3434
}
@@ -44,6 +44,14 @@
4444
"type": "WEB",
4545
"url": "https://github.com/messageformat/messageformat/issues/453"
4646
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/messageformat/messageformat/pull/464"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/messageformat/messageformat/commit/82cd10b40e3f922f990bbcf88a6d14b70c0a3ce0"
54+
},
4755
{
4856
"type": "WEB",
4957
"url": "https://github.com/VulnSageAgent/PoCs/tree/main/JavaScript/prototype-pollution/CVE-2025-57353"

0 commit comments

Comments
 (0)