CVE-2025-57353: messageformat prototype pollution vulnerability
(updated )
The Runtime components of messageformat package for Node.js version 3.0.1 contain a prototype pollution vulnerability. Due to insufficient validation of nested message keys during the processing of message data, an attacker can manipulate the prototype chain of JavaScript objects by providing specially crafted input. This can result in the injection of arbitrary properties into the Object.prototype, potentially leading to denial of service conditions or unexpected application behavior. The vulnerability allows attackers to alter the prototype of base objects, impacting all subsequent object instances throughout the application’s lifecycle. Version 3.0.2 contains a fix.
References
- github.com/VulnSageAgent/PoCs/tree/main/JavaScript/prototype-pollution/CVE-2025-57353
- github.com/advisories/GHSA-6xv4-9cqp-92rh
- github.com/messageformat/messageformat
- github.com/messageformat/messageformat/commit/82cd10b40e3f922f990bbcf88a6d14b70c0a3ce0
- github.com/messageformat/messageformat/issues/453
- github.com/messageformat/messageformat/issues/453
- github.com/messageformat/messageformat/pull/464
- nvd.nist.gov/vuln/detail/CVE-2025-57353
Code Behaviors & Features
Detect and mitigate CVE-2025-57353 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →