CVE-2025-31475: tarteaucitron.js allows prototype pollution via custom text injection
A vulnerability was identified in tarteaucitron.js
, where the addOrUpdate
function, used for applying custom texts, did not properly validate input. This allowed an attacker with direct access to the site’s source code or a CMS plugin to manipulate JavaScript object prototypes, leading to potential security risks such as data corruption or unintended code execution.
References
Code Behaviors & Features
Detect and mitigate CVE-2025-31475 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →