The Runtime components of messageformat package for Node.js prior to version 3.0.1 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle. This issue remains unaddressed in the latest available version.
Metrics
Affected Vendors & Products
References
History
Thu, 25 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1321 | |
Metrics |
cvssV3_1
|
Thu, 25 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nodejs
Nodejs messageformat Nodejs nodejs |
|
Vendors & Products |
Nodejs
Nodejs messageformat Nodejs nodejs |
Wed, 24 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Runtime components of messageformat package for Node.js prior to version 3.0.1 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle. This issue remains unaddressed in the latest available version. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-25T18:26:17.258Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57353

Updated: 2025-09-25T18:26:10.509Z

Status : Awaiting Analysis
Published: 2025-09-24T18:15:41.793
Modified: 2025-09-26T14:32:53.583
Link: CVE-2025-57353

No data.