We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48054

Radashi Vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')



Description

Radashi is a TypeScript utility toolkit. Prior to version 12.5.1, the set function within the Radashi library is vulnerable to prototype pollution. If an attacker can control parts of the path argument to the set function, they could potentially modify the prototype of all objects in the JavaScript runtime, leading to unexpected behavior, denial of service, or even remote code execution in some specific scenarios. This issue has been patched in version 12.5.1. A workaround for this issue involves sanitizing the path argument provided to the set function to ensure that no part of the path string is __proto__, prototype, or constructor.

Reserved 2025-05-15 | Published 2025-05-27 | Updated 2025-05-27 | Assigner GitHub_M


MEDIUM: 6.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U

Problem types

CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Product status

< 12.5.1
affected

References

github.com/...adashi/security/advisories/GHSA-2xv9-ghh9-xc69

github.com/...ommit/8147abc8cfc3cfe9b9a17cd389076a5d97235a66

cve.org (CVE-2025-48054)

nvd.nist.gov (CVE-2025-48054)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48054

Support options

Helpdesk Chat, Email, Knowledgebase