CVE-2025-57349
BaseFortify
Publication date: 2025-09-24
Last updated on: 2025-10-17
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openjsf | messageformat | to 2.3.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1321 | The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a prototype pollution issue in the messageformat package for JavaScript versions prior to 2.3.0. It occurs because the package improperly handles nested message keys containing special characters like __proto__, allowing an attacker to modify the global JavaScript Object prototype by injecting properties through crafted message inputs.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can inject properties into the global object prototype, which may lead to denial of service or other unpredictable behaviors in applications that use the affected messageformat package.