Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. messageformat
  4. ›
  5. CVE-2025-57349

CVE-2025-57349: messageformat has a prototype pollution vulnerability

September 24, 2025 (updated September 25, 2025)

The messageformat package, an implementation of the Unicode MessageFormat 2 specification for JavaScript, is vulnerable to prototype pollution due to improper handling of message key paths in versions prior to 2.3.0. The flaw arises when processing nested message keys containing special characters (e.g., proto ), which can lead to unintended modification of the JavaScript Object prototype. This vulnerability may allow a remote attacker to inject properties into the global object prototype via specially crafted message input, potentially causing denial of service or other undefined behaviors in applications using the affected component.

References

  • github.com/advisories/GHSA-xfqm-j7pc-xrfc
  • github.com/messageformat/messageformat
  • github.com/messageformat/messageformat/issues/452
  • nvd.nist.gov/vuln/detail/CVE-2025-57349

Code Behaviors & Features

Detect and mitigate CVE-2025-57349 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.0.0-beta.0

Fixed versions

  • 3.0.0-beta.0

Solution

Upgrade to version 3.0.0-beta.0 or above.

Weakness

  • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Source file

npm/messageformat/CVE-2025-57349.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 07 Oct 2025 00:18:37 +0000.