Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57351: n/a

0
Medium
VulnerabilityCVE-2025-57351cvecve-2025-57351
Published: Wed Sep 24 2025 (09/24/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A prototype pollution vulnerability exists in the ts-fns package versions prior to 13.0.7, where insufficient validation of user-provided keys in the assign function allows attackers to manipulate the Object.prototype chain. By leveraging this flaw, adversaries may inject arbitrary properties into the global object's prototype, potentially leading to application crashes, unexpected code execution behaviors, or bypasses of security-critical validation logic dependent on prototype integrity. The vulnerability stems from improper handling of deep property assignment operations within the library's public API functions. This issue remains unaddressed in the latest available version.

AI-Powered Analysis

AILast updated: 10/02/2025, 00:59:38 UTC

Technical Analysis

CVE-2025-57351 is a prototype pollution vulnerability identified in the ts-fns package, a JavaScript utility library. The vulnerability arises from insufficient validation of user-supplied keys in the assign function, which allows attackers to manipulate the Object.prototype chain. Prototype pollution occurs when an attacker can inject or modify properties on the global Object prototype, thereby affecting all objects that inherit from it. In this case, the flaw is due to improper handling of deep property assignments within the library's public API, enabling adversaries to inject arbitrary properties into the global prototype. This manipulation can lead to various adverse effects, including application crashes, unexpected or malicious code execution behaviors, and bypasses of security-critical validation logic that relies on the integrity of the prototype chain. The vulnerability affects versions of ts-fns prior to 13.0.7 and, notably, remains unpatched as of the latest available version. The CVSS score assigned is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). No known exploits are reported in the wild yet. The underlying CWE is 1321, which relates to improper handling of prototype pollution vulnerabilities. This vulnerability is critical in environments where ts-fns is used to process untrusted input, as it can be exploited remotely without authentication or user interaction, potentially compromising application stability and security.

Potential Impact

For European organizations, the impact of CVE-2025-57351 can be significant, especially for those relying on JavaScript-based applications or services that incorporate the ts-fns package for date/time or utility functions. Prototype pollution can lead to application instability, crashes, or unexpected behavior, which may disrupt business operations. More critically, the ability to inject arbitrary properties into the global prototype can be leveraged to bypass security controls, potentially allowing attackers to evade input validation or security checks, leading to further exploitation such as remote code execution or privilege escalation in complex attack chains. This risk is heightened in web applications exposed to the internet or processing untrusted user input. The medium CVSS score reflects a moderate risk, but the lack of required privileges and user interaction increases the likelihood of exploitation. European organizations in sectors such as finance, healthcare, and critical infrastructure, which often use JavaScript frameworks extensively, could face operational disruptions and data integrity issues. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection and security; exploitation of this vulnerability could lead to compliance violations and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-57351, European organizations should take the following specific actions: 1) Identify all applications and services using the ts-fns package, particularly versions prior to 13.0.7. 2) Since no official patch is currently available, consider temporarily removing or replacing the assign function usage with safer alternatives that do not allow prototype pollution, or implement strict input validation and sanitization to reject keys that could manipulate the prototype chain (e.g., keys like '__proto__', 'constructor', or 'prototype'). 3) Employ runtime application self-protection (RASP) or Web Application Firewalls (WAFs) configured to detect and block prototype pollution attack patterns. 4) Conduct thorough code reviews and static analysis to identify unsafe deep property assignments in the codebase. 5) Monitor application logs and behavior for anomalies indicative of prototype pollution exploitation attempts. 6) Engage with the ts-fns maintainers or community to track patch releases and apply updates promptly once available. 7) Educate developers about the risks of prototype pollution and secure coding practices to prevent similar vulnerabilities. These steps go beyond generic advice by focusing on immediate code-level mitigations and proactive monitoring in the absence of an official patch.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d4384798715fbf47f03b71

Added to database: 9/24/2025, 6:28:23 PM

Last enriched: 10/2/2025, 12:59:38 AM

Last updated: 11/8/2025, 11:31:31 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats