CVE-2025-62410: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in capricorn86 happy-dom
In versions before 20.0.2, it was found that --disallow-code-generation-from-strings is not sufficient for isolating untrusted JavaScript in happy-dom. The untrusted script and the rest of the application still run in the same Isolate/process, so attackers can deploy prototype pollution payloads to hijack important references like "process" in the example below, or to hijack control flow via flipping checks of undefined property. This vulnerability is due to an incomplete fix for CVE-2025-61927. The vulnerability is fixed in 20.0.2.
AI Analysis
Technical Summary
CVE-2025-62410 is a prototype pollution vulnerability affecting the happy-dom JavaScript DOM implementation library maintained by capricorn86. In versions prior to 20.0.2, the security measure --disallow-code-generation-from-strings intended to isolate untrusted JavaScript code is insufficient because untrusted scripts and the main application execute within the same V8 isolate or process context. This shared environment allows attackers to perform prototype pollution attacks by injecting malicious payloads that modify the prototype chain of JavaScript objects. Such pollution can hijack critical references, for example, the Node.js 'process' object, enabling attackers to manipulate environment variables, spawn processes, or escalate privileges. Additionally, attackers can flip checks on undefined properties, altering control flow and bypassing security logic. This vulnerability is a regression or incomplete fix of CVE-2025-61927, indicating prior attempts to address prototype pollution were inadequate. The vulnerability has a CVSS 4.0 score of 9.4, reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality, integrity, and availability. No public exploits are known yet, but the risk is severe given the potential for remote code execution and application compromise. The issue is fixed in happy-dom version 20.0.2, and users are urged to upgrade promptly.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those using happy-dom in server-side rendering, testing environments, or any JavaScript execution contexts that process untrusted code. Successful exploitation can lead to remote code execution, data exfiltration, privilege escalation, and disruption of services. This can compromise sensitive data confidentiality and integrity, and cause availability outages. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on Node.js ecosystems and JavaScript DOM emulation are particularly vulnerable. The shared process execution model increases the attack surface, making containment difficult. Given the high CVSS score and critical severity, failure to patch could lead to severe operational and reputational damage, regulatory non-compliance under GDPR, and potential legal liabilities.
Mitigation Recommendations
European organizations should immediately upgrade all instances of happy-dom to version 20.0.2 or later, where the vulnerability is fixed. Additionally, they should audit their use of untrusted JavaScript execution within the same process or isolate to ensure proper sandboxing. Employ strict input validation and content security policies to limit injection of malicious scripts. Consider architectural changes to separate untrusted code execution into distinct processes or containers to prevent prototype pollution from affecting the main application. Implement runtime monitoring and anomaly detection to identify suspicious prototype modifications or unusual process behavior. Regularly review dependency versions and subscribe to security advisories for timely patching. Finally, conduct security testing focused on prototype pollution and code injection vectors in development and staging environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-62410: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in capricorn86 happy-dom
Description
In versions before 20.0.2, it was found that --disallow-code-generation-from-strings is not sufficient for isolating untrusted JavaScript in happy-dom. The untrusted script and the rest of the application still run in the same Isolate/process, so attackers can deploy prototype pollution payloads to hijack important references like "process" in the example below, or to hijack control flow via flipping checks of undefined property. This vulnerability is due to an incomplete fix for CVE-2025-61927. The vulnerability is fixed in 20.0.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-62410 is a prototype pollution vulnerability affecting the happy-dom JavaScript DOM implementation library maintained by capricorn86. In versions prior to 20.0.2, the security measure --disallow-code-generation-from-strings intended to isolate untrusted JavaScript code is insufficient because untrusted scripts and the main application execute within the same V8 isolate or process context. This shared environment allows attackers to perform prototype pollution attacks by injecting malicious payloads that modify the prototype chain of JavaScript objects. Such pollution can hijack critical references, for example, the Node.js 'process' object, enabling attackers to manipulate environment variables, spawn processes, or escalate privileges. Additionally, attackers can flip checks on undefined properties, altering control flow and bypassing security logic. This vulnerability is a regression or incomplete fix of CVE-2025-61927, indicating prior attempts to address prototype pollution were inadequate. The vulnerability has a CVSS 4.0 score of 9.4, reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality, integrity, and availability. No public exploits are known yet, but the risk is severe given the potential for remote code execution and application compromise. The issue is fixed in happy-dom version 20.0.2, and users are urged to upgrade promptly.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those using happy-dom in server-side rendering, testing environments, or any JavaScript execution contexts that process untrusted code. Successful exploitation can lead to remote code execution, data exfiltration, privilege escalation, and disruption of services. This can compromise sensitive data confidentiality and integrity, and cause availability outages. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on Node.js ecosystems and JavaScript DOM emulation are particularly vulnerable. The shared process execution model increases the attack surface, making containment difficult. Given the high CVSS score and critical severity, failure to patch could lead to severe operational and reputational damage, regulatory non-compliance under GDPR, and potential legal liabilities.
Mitigation Recommendations
European organizations should immediately upgrade all instances of happy-dom to version 20.0.2 or later, where the vulnerability is fixed. Additionally, they should audit their use of untrusted JavaScript execution within the same process or isolate to ensure proper sandboxing. Employ strict input validation and content security policies to limit injection of malicious scripts. Consider architectural changes to separate untrusted code execution into distinct processes or containers to prevent prototype pollution from affecting the main application. Implement runtime monitoring and anomaly detection to identify suspicious prototype modifications or unusual process behavior. Regularly review dependency versions and subscribe to security advisories for timely patching. Finally, conduct security testing focused on prototype pollution and code injection vectors in development and staging environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-13T16:26:12.178Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68efdcb86817339dcf78279f
Added to database: 10/15/2025, 5:41:12 PM
Last enriched: 10/15/2025, 5:49:10 PM
Last updated: 10/15/2025, 7:35:33 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11832: CWE-770 Allocation of Resources Without Limits or Throttling in Azure Access Technology BLU-IC2
CriticalCVE-2024-6592: CWE-306 Missing Authentication for Critical Function in WatchGuard Authentication Gateway
CriticalCVE-2025-62371: CWE-295: Improper Certificate Validation in opensearch-project data-prepper
HighCVE-2025-62382: CWE-73: External Control of File Name or Path in blakeblackshear frigate
HighCVE-2025-62381: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in ciscoheat sveltekit-superforms
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.