CVE-2025-3982: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nortikin Sverchok
A vulnerability, which was classified as problematic, was found in nortikin Sverchok 1.3.0. Affected is the function SvSetPropNodeMK2 of the file sverchok/nodes/object_nodes/getsetprop_mk2.py of the component Set Property Mk2 Node. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-3982 is a medium-severity vulnerability identified in version 1.3.0 of nortikin Sverchok, an open-source parametric tool for Blender used primarily for procedural geometry and node-based visual programming. The vulnerability exists in the function SvSetPropNodeMK2 within the file sverchok/nodes/object_nodes/getsetprop_mk2.py, specifically in the Set Property Mk2 Node component. It involves improper control over the modification of object prototype attributes, commonly referred to as 'prototype pollution.' Prototype pollution occurs when an attacker is able to inject or modify properties on an object's prototype, which can lead to unexpected behavior in the application, including potential escalation of privileges, data manipulation, or denial of service. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The attack complexity is low, and the vulnerability impacts the integrity of the system with limited impact on availability and no direct impact on confidentiality. The vendor, nortikin, was contacted early but did not respond or provide a patch, and no official fix or mitigation has been published as of now. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability affects only version 1.3.0 of Sverchok, which is a niche product primarily used by 3D artists, designers, and developers working within Blender environments for procedural modeling and scripting. Given the nature of prototype pollution, attackers could manipulate the behavior of Sverchok nodes, potentially causing incorrect geometry generation or injecting malicious logic into workflows that rely on Sverchok scripts, which may impact downstream processes or automated pipelines that depend on Sverchok outputs.
Potential Impact
For European organizations, the impact of CVE-2025-3982 is primarily relevant to entities that utilize Blender with the Sverchok add-on in their design, engineering, or creative workflows. This includes architectural firms, product design companies, visual effects studios, and educational institutions specializing in 3D modeling and computational design. Exploitation could lead to integrity issues in design outputs, potentially causing flawed models or corrupted data that could disrupt production pipelines or lead to costly rework. While the vulnerability does not directly compromise confidentiality or availability, the integrity compromise could undermine trust in automated design processes and introduce risks in environments where precise modeling is critical. Additionally, if Sverchok is integrated into automated build or rendering pipelines, prototype pollution could be leveraged to execute arbitrary code or disrupt automation, indirectly affecting availability. The lack of vendor response and patch availability increases the risk exposure for organizations relying on this tool. However, the relatively specialized user base and limited scope of affected versions reduce the overall widespread impact. Organizations with strict supply chain security or those involved in critical infrastructure design using Blender may face higher risks if exploited.
Mitigation Recommendations
Given the absence of an official patch, European organizations should take immediate practical steps to mitigate risk: 1) Audit and inventory all Blender installations to identify usage of Sverchok version 1.3.0. 2) Temporarily disable or uninstall the Sverchok add-on until a patched version is released. 3) Restrict network access to systems running Sverchok to trusted internal networks to reduce remote exploitation risk. 4) Implement strict input validation and sanitization in any custom Sverchok scripts or nodes to prevent injection of malicious prototype properties. 5) Monitor Blender and Sverchok community channels for updates or unofficial patches and apply them after thorough testing. 6) For organizations using automated pipelines involving Sverchok, introduce additional integrity checks on generated outputs to detect anomalies. 7) Educate users about the risks of loading untrusted Sverchok node configurations or scripts. 8) Consider sandboxing or isolating Blender environments to limit potential impact of exploitation. These targeted measures go beyond generic advice by focusing on the specific context of Sverchok usage and prototype pollution attack vectors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-3982: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nortikin Sverchok
Description
A vulnerability, which was classified as problematic, was found in nortikin Sverchok 1.3.0. Affected is the function SvSetPropNodeMK2 of the file sverchok/nodes/object_nodes/getsetprop_mk2.py of the component Set Property Mk2 Node. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-3982 is a medium-severity vulnerability identified in version 1.3.0 of nortikin Sverchok, an open-source parametric tool for Blender used primarily for procedural geometry and node-based visual programming. The vulnerability exists in the function SvSetPropNodeMK2 within the file sverchok/nodes/object_nodes/getsetprop_mk2.py, specifically in the Set Property Mk2 Node component. It involves improper control over the modification of object prototype attributes, commonly referred to as 'prototype pollution.' Prototype pollution occurs when an attacker is able to inject or modify properties on an object's prototype, which can lead to unexpected behavior in the application, including potential escalation of privileges, data manipulation, or denial of service. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The attack complexity is low, and the vulnerability impacts the integrity of the system with limited impact on availability and no direct impact on confidentiality. The vendor, nortikin, was contacted early but did not respond or provide a patch, and no official fix or mitigation has been published as of now. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability affects only version 1.3.0 of Sverchok, which is a niche product primarily used by 3D artists, designers, and developers working within Blender environments for procedural modeling and scripting. Given the nature of prototype pollution, attackers could manipulate the behavior of Sverchok nodes, potentially causing incorrect geometry generation or injecting malicious logic into workflows that rely on Sverchok scripts, which may impact downstream processes or automated pipelines that depend on Sverchok outputs.
Potential Impact
For European organizations, the impact of CVE-2025-3982 is primarily relevant to entities that utilize Blender with the Sverchok add-on in their design, engineering, or creative workflows. This includes architectural firms, product design companies, visual effects studios, and educational institutions specializing in 3D modeling and computational design. Exploitation could lead to integrity issues in design outputs, potentially causing flawed models or corrupted data that could disrupt production pipelines or lead to costly rework. While the vulnerability does not directly compromise confidentiality or availability, the integrity compromise could undermine trust in automated design processes and introduce risks in environments where precise modeling is critical. Additionally, if Sverchok is integrated into automated build or rendering pipelines, prototype pollution could be leveraged to execute arbitrary code or disrupt automation, indirectly affecting availability. The lack of vendor response and patch availability increases the risk exposure for organizations relying on this tool. However, the relatively specialized user base and limited scope of affected versions reduce the overall widespread impact. Organizations with strict supply chain security or those involved in critical infrastructure design using Blender may face higher risks if exploited.
Mitigation Recommendations
Given the absence of an official patch, European organizations should take immediate practical steps to mitigate risk: 1) Audit and inventory all Blender installations to identify usage of Sverchok version 1.3.0. 2) Temporarily disable or uninstall the Sverchok add-on until a patched version is released. 3) Restrict network access to systems running Sverchok to trusted internal networks to reduce remote exploitation risk. 4) Implement strict input validation and sanitization in any custom Sverchok scripts or nodes to prevent injection of malicious prototype properties. 5) Monitor Blender and Sverchok community channels for updates or unofficial patches and apply them after thorough testing. 6) For organizations using automated pipelines involving Sverchok, introduce additional integrity checks on generated outputs to detect anomalies. 7) Educate users about the risks of loading untrusted Sverchok node configurations or scripts. 8) Consider sandboxing or isolating Blender environments to limit potential impact of exploitation. These targeted measures go beyond generic advice by focusing on the specific context of Sverchok usage and prototype pollution attack vectors.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-26T07:56:21.858Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef54b
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 8:51:38 PM
Last updated: 8/17/2025, 3:08:11 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.