Home

Description

The Runtime components of messageformat package for Node.js before 3.0.2 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application's lifecycle.

PUBLISHED Reserved 2025-08-17 | Published 2025-09-24 | Updated 2025-11-05 | Assigner mitre

References

github.com/messageformat/messageformat/issues/453

github.com/.../JavaScript/prototype-pollution/CVE-2025-57353

github.com/messageformat/messageformat/pull/464

github.com/...ommit/82cd10b40e3f922f990bbcf88a6d14b70c0a3ce0

github.com/messageformat/messageformat/issues/453

cve.org (CVE-2025-57353)

nvd.nist.gov (CVE-2025-57353)

Download JSON