The Runtime components of messageformat package for Node.js before 3.0.2 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-31039 messageformat prototype pollution vulnerability
Github GHSA Github GHSA GHSA-6xv4-9cqp-92rh messageformat prototype pollution vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 31 Oct 2025 09:15:00 +0900

Type Values Removed Values Added
Description The Runtime components of messageformat package for Node.js prior to version 3.0.1 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle. This issue remains unaddressed in the latest available version. The Runtime components of messageformat package for Node.js before 3.0.2 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle.
References

Fri, 26 Sep 2025 04:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-1321
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 25 Sep 2025 17:30:00 +0900

Type Values Removed Values Added
First Time appeared Nodejs
Nodejs messageformat
Nodejs nodejs
Vendors & Products Nodejs
Nodejs messageformat
Nodejs nodejs

Thu, 25 Sep 2025 03:15:00 +0900

Type Values Removed Values Added
Description The Runtime components of messageformat package for Node.js prior to version 3.0.1 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle. This issue remains unaddressed in the latest available version.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-05T18:32:07.743Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57353

cve-icon Vulnrichment

Updated: 2025-09-25T18:26:10.509Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-24T18:15:41.793

Modified: 2025-10-31T00:15:37.110

Link: CVE-2025-57353

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-25T17:22:02Z

Weaknesses