Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57320: n/a

0
Medium
VulnerabilityCVE-2025-57320cvecve-2025-57320
Published: Wed Sep 24 2025 (09/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

json-schema-editor-visual is a package that provides jsonschema editor. A Prototype Pollution vulnerability in the setData and deleteData function of json-schema-editor-visual versions thru 1.1.1 allows attackers to inject or delete properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.

AI-Powered Analysis

AILast updated: 10/02/2025, 00:59:26 UTC

Technical Analysis

CVE-2025-57320 is a Prototype Pollution vulnerability found in the json-schema-editor-visual package, which is a tool used to provide a JSON Schema editor interface. The vulnerability exists in the setData and deleteData functions of versions up to 1.1.1. Prototype Pollution occurs when an attacker is able to inject or delete properties on JavaScript's Object.prototype by supplying a crafted payload. This manipulation can lead to unexpected behavior in applications that rely on the affected package. In this case, the minimum consequence identified is a denial of service (DoS), which can disrupt the normal functioning of applications using this package. The vulnerability has a CVSS v3.1 base score of 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) shows that the attack can be performed remotely over the network without any privileges or user interaction, impacting availability and causing limited confidentiality loss. No known exploits are currently reported in the wild, and no patches have been linked yet. The CWE associated is CWE-1321, which relates to improper handling of prototype pollution issues. Prototype Pollution vulnerabilities are particularly dangerous because they can alter the behavior of JavaScript objects globally, potentially leading to security bypasses, data corruption, or application crashes.

Potential Impact

For European organizations, the impact of this vulnerability depends on the extent to which json-schema-editor-visual is used within their software stacks, particularly in web applications or internal tools that handle JSON schema editing. The ability to cause denial of service remotely without authentication means that attackers could disrupt critical services or development environments, leading to downtime and productivity loss. Although the confidentiality and integrity impacts are limited, the availability impact could affect business continuity, especially for organizations relying on real-time or continuous data validation and editing. Additionally, if attackers chain this vulnerability with others, it could potentially lead to more severe consequences. The lack of known exploits in the wild currently reduces immediate risk, but proactive mitigation is important to prevent future exploitation. European organizations in sectors such as software development, financial services, and critical infrastructure that use JavaScript-based tooling should be particularly vigilant.

Mitigation Recommendations

1. Immediate mitigation involves auditing the use of json-schema-editor-visual in all applications and development environments to identify affected versions (up to 1.1.1). 2. Since no official patches are currently linked, organizations should monitor the package repository and security advisories for updates or patches addressing this vulnerability and apply them promptly once available. 3. As a temporary measure, consider implementing input validation and sanitization to prevent malicious payloads from reaching the vulnerable functions. 4. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) that can detect and block suspicious payloads targeting prototype pollution. 5. Conduct code reviews and static analysis to detect unsafe usage of Object.prototype manipulation in custom code. 6. Educate developers about prototype pollution risks and secure coding practices to prevent similar vulnerabilities. 7. For critical systems, consider isolating or sandboxing components that use this package to limit the blast radius of potential attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d457a3d6be26694ed76f80

Added to database: 9/24/2025, 8:42:11 PM

Last enriched: 10/2/2025, 12:59:26 AM

Last updated: 11/6/2025, 6:51:35 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats