CVE-2025-57353
BaseFortify
Publication date: 2025-09-24
Last updated on: 2025-10-31
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| messageformat | runtime | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1321 | The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a prototype pollution issue in the Runtime components of the messageformat package for Node.js versions prior to 3.0.1. It occurs because the software does not properly validate nested message keys when processing message data. An attacker can exploit this by providing specially crafted input that manipulates the prototype chain of JavaScript objects, injecting arbitrary properties into Object.prototype. This can affect all objects created afterward in the application.
How can this vulnerability impact me? :
The vulnerability can lead to denial of service conditions or cause unexpected application behavior by allowing attackers to alter the prototype of base objects. This impacts all subsequent object instances throughout the application's lifecycle, potentially compromising application stability and security.