Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  EUVD | EUVD-2025-31039 | messageformat prototype pollution vulnerability | 
|  Github GHSA | GHSA-6xv4-9cqp-92rh | messageformat prototype pollution vulnerability | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 31 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The Runtime components of messageformat package for Node.js prior to version 3.0.1 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle. This issue remains unaddressed in the latest available version. | The Runtime components of messageformat package for Node.js before 3.0.2 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle. | 
| References |  | 
Thu, 25 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-1321 | |
| Metrics | cvssV3_1 
 
 | 
Thu, 25 Sep 2025 08:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Nodejs Nodejs messageformat Nodejs nodejs | |
| Vendors & Products | Nodejs Nodejs messageformat Nodejs nodejs | 
Wed, 24 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The Runtime components of messageformat package for Node.js prior to version 3.0.1 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle. This issue remains unaddressed in the latest available version. | |
| References |  | 
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-31T00:06:49.464Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57353
Updated: 2025-09-25T18:26:10.509Z
Status : Awaiting Analysis
Published: 2025-09-24T18:15:41.793
Modified: 2025-10-31T00:15:37.110
Link: CVE-2025-57353
No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    Updated: 2025-09-25T08:22:02Z