Skip to main content

CVE-2025-3982: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nortikin Sverchok

Medium
VulnerabilityCVE-2025-3982cvecve-2025-3982
Published: Sun Apr 27 2025 (04/27/2025, 19:00:05 UTC)
Source: CVE
Vendor/Project: nortikin
Product: Sverchok

Description

A vulnerability, which was classified as problematic, was found in nortikin Sverchok 1.3.0. Affected is the function SvSetPropNodeMK2 of the file sverchok/nodes/object_nodes/getsetprop_mk2.py of the component Set Property Mk2 Node. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 06/24/2025, 20:51:38 UTC

Technical Analysis

CVE-2025-3982 is a medium-severity vulnerability identified in version 1.3.0 of nortikin Sverchok, an open-source parametric tool for Blender used primarily for procedural geometry and node-based visual programming. The vulnerability exists in the function SvSetPropNodeMK2 within the file sverchok/nodes/object_nodes/getsetprop_mk2.py, specifically in the Set Property Mk2 Node component. It involves improper control over the modification of object prototype attributes, commonly referred to as 'prototype pollution.' Prototype pollution occurs when an attacker is able to inject or modify properties on an object's prototype, which can lead to unexpected behavior in the application, including potential escalation of privileges, data manipulation, or denial of service. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The attack complexity is low, and the vulnerability impacts the integrity of the system with limited impact on availability and no direct impact on confidentiality. The vendor, nortikin, was contacted early but did not respond or provide a patch, and no official fix or mitigation has been published as of now. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability affects only version 1.3.0 of Sverchok, which is a niche product primarily used by 3D artists, designers, and developers working within Blender environments for procedural modeling and scripting. Given the nature of prototype pollution, attackers could manipulate the behavior of Sverchok nodes, potentially causing incorrect geometry generation or injecting malicious logic into workflows that rely on Sverchok scripts, which may impact downstream processes or automated pipelines that depend on Sverchok outputs.

Potential Impact

For European organizations, the impact of CVE-2025-3982 is primarily relevant to entities that utilize Blender with the Sverchok add-on in their design, engineering, or creative workflows. This includes architectural firms, product design companies, visual effects studios, and educational institutions specializing in 3D modeling and computational design. Exploitation could lead to integrity issues in design outputs, potentially causing flawed models or corrupted data that could disrupt production pipelines or lead to costly rework. While the vulnerability does not directly compromise confidentiality or availability, the integrity compromise could undermine trust in automated design processes and introduce risks in environments where precise modeling is critical. Additionally, if Sverchok is integrated into automated build or rendering pipelines, prototype pollution could be leveraged to execute arbitrary code or disrupt automation, indirectly affecting availability. The lack of vendor response and patch availability increases the risk exposure for organizations relying on this tool. However, the relatively specialized user base and limited scope of affected versions reduce the overall widespread impact. Organizations with strict supply chain security or those involved in critical infrastructure design using Blender may face higher risks if exploited.

Mitigation Recommendations

Given the absence of an official patch, European organizations should take immediate practical steps to mitigate risk: 1) Audit and inventory all Blender installations to identify usage of Sverchok version 1.3.0. 2) Temporarily disable or uninstall the Sverchok add-on until a patched version is released. 3) Restrict network access to systems running Sverchok to trusted internal networks to reduce remote exploitation risk. 4) Implement strict input validation and sanitization in any custom Sverchok scripts or nodes to prevent injection of malicious prototype properties. 5) Monitor Blender and Sverchok community channels for updates or unofficial patches and apply them after thorough testing. 6) For organizations using automated pipelines involving Sverchok, introduce additional integrity checks on generated outputs to detect anomalies. 7) Educate users about the risks of loading untrusted Sverchok node configurations or scripts. 8) Consider sandboxing or isolating Blender environments to limit potential impact of exploitation. These targeted measures go beyond generic advice by focusing on the specific context of Sverchok usage and prototype pollution attack vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-26T07:56:21.858Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef54b

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 8:51:38 PM

Last updated: 8/17/2025, 3:08:11 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats