Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57350: n/a

0
High
VulnerabilityCVE-2025-57350cvecve-2025-57350
Published: Wed Sep 24 2025 (09/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The csvtojson package, a tool for converting CSV data to JSON with customizable parsing capabilities, contains a prototype pollution vulnerability in versions prior to 2.0.10. This issue arises due to insufficient sanitization of nested header names during the parsing process in the parser_jsonarray component. When processing CSV input containing specially crafted header fields that reference prototype chains (e.g., using __proto__ syntax), the application may unintentionally modify properties of the base Object prototype. This vulnerability can lead to denial of service conditions or unexpected behavior in applications relying on unmodified prototype chains, particularly when untrusted CSV data is processed. The flaw does not require user interaction beyond providing a maliciously constructed CSV file.

AI-Powered Analysis

AILast updated: 09/24/2025, 18:16:34 UTC

Technical Analysis

CVE-2025-57350 is a prototype pollution vulnerability identified in the csvtojson package, a widely used tool for converting CSV data into JSON format with customizable parsing features. The vulnerability exists in versions prior to 2.0.10, specifically within the parser_jsonarray component responsible for handling CSV headers. The root cause is insufficient sanitization of nested header names, allowing specially crafted CSV headers that include prototype chain references such as '__proto__' to manipulate the base Object prototype in JavaScript. This manipulation can alter or inject properties into the global Object prototype, which affects all objects inheriting from it. Such prototype pollution can lead to denial of service (DoS) conditions or cause unpredictable behavior in applications that rely on the integrity of prototype chains. Importantly, exploitation does not require user interaction beyond supplying a malicious CSV file, making automated or remote exploitation feasible in scenarios where untrusted CSV data is processed. While no known exploits are currently reported in the wild, the vulnerability poses a significant risk to applications that parse CSV inputs without adequate validation or sanitization. The absence of a CVSS score indicates this is a newly published vulnerability, reserved in August 2025 and published in September 2025, with no patch links currently available, suggesting that remediation efforts may still be underway or pending release.

Potential Impact

For European organizations, the impact of CVE-2025-57350 can be substantial, especially for those relying on the csvtojson package in their data processing pipelines, analytics platforms, or web applications that ingest CSV data from external or untrusted sources. Prototype pollution can compromise application integrity by corrupting internal object states, potentially leading to application crashes, denial of service, or erratic behavior that undermines data processing reliability. This can disrupt business operations, cause data processing errors, or open indirect avenues for further exploitation if attackers leverage the polluted prototype to escalate privileges or bypass security controls. Organizations in sectors such as finance, healthcare, manufacturing, and government, which often handle large volumes of CSV data for reporting or integration, are particularly at risk. Additionally, the ease of exploitation without user interaction increases the threat surface, as attackers can automate attacks by submitting malicious CSV files through exposed interfaces or APIs. The lack of immediate patches means organizations must act proactively to mitigate risk. Failure to address this vulnerability could lead to operational downtime, reputational damage, and potential regulatory compliance issues under frameworks like GDPR if data integrity or availability is compromised.

Mitigation Recommendations

To mitigate CVE-2025-57350 effectively, European organizations should implement the following specific measures: 1) Immediately audit all applications and services that utilize the csvtojson package, identifying versions prior to 2.0.10 and prioritizing their update once a patched version is released. 2) Until patches are available, implement input validation and sanitization controls to detect and reject CSV files containing suspicious header fields, particularly those with '__proto__' or other prototype chain references. 3) Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to monitor and block attempts to exploit prototype pollution via CSV inputs. 4) Isolate CSV processing components in sandboxed or containerized environments to limit the impact of potential exploitation on broader systems. 5) Conduct code reviews and static analysis to identify other potential prototype pollution vectors within the codebase. 6) Enhance logging and monitoring around CSV ingestion points to detect anomalous behavior indicative of exploitation attempts. 7) Educate development and security teams about prototype pollution risks and secure coding practices related to object property handling in JavaScript. These targeted actions go beyond generic advice by focusing on immediate risk reduction through input controls and environment isolation while preparing for patch deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d4352b82e2e362236e2479

Added to database: 9/24/2025, 6:15:07 PM

Last enriched: 9/24/2025, 6:16:34 PM

Last updated: 10/7/2025, 7:33:29 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats