Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62410: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in capricorn86 happy-dom

0
Critical
VulnerabilityCVE-2025-62410cvecve-2025-62410cwe-1321
Published: Wed Oct 15 2025 (10/15/2025, 17:16:21 UTC)
Source: CVE Database V5
Vendor/Project: capricorn86
Product: happy-dom

Description

In versions before 20.0.2, it was found that --disallow-code-generation-from-strings is not sufficient for isolating untrusted JavaScript in happy-dom. The untrusted script and the rest of the application still run in the same Isolate/process, so attackers can deploy prototype pollution payloads to hijack important references like "process" in the example below, or to hijack control flow via flipping checks of undefined property. This vulnerability is due to an incomplete fix for CVE-2025-61927. The vulnerability is fixed in 20.0.2.

AI-Powered Analysis

AILast updated: 10/15/2025, 17:49:10 UTC

Technical Analysis

CVE-2025-62410 is a prototype pollution vulnerability affecting the happy-dom JavaScript DOM implementation library maintained by capricorn86. In versions prior to 20.0.2, the security measure --disallow-code-generation-from-strings intended to isolate untrusted JavaScript code is insufficient because untrusted scripts and the main application execute within the same V8 isolate or process context. This shared environment allows attackers to perform prototype pollution attacks by injecting malicious payloads that modify the prototype chain of JavaScript objects. Such pollution can hijack critical references, for example, the Node.js 'process' object, enabling attackers to manipulate environment variables, spawn processes, or escalate privileges. Additionally, attackers can flip checks on undefined properties, altering control flow and bypassing security logic. This vulnerability is a regression or incomplete fix of CVE-2025-61927, indicating prior attempts to address prototype pollution were inadequate. The vulnerability has a CVSS 4.0 score of 9.4, reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality, integrity, and availability. No public exploits are known yet, but the risk is severe given the potential for remote code execution and application compromise. The issue is fixed in happy-dom version 20.0.2, and users are urged to upgrade promptly.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those using happy-dom in server-side rendering, testing environments, or any JavaScript execution contexts that process untrusted code. Successful exploitation can lead to remote code execution, data exfiltration, privilege escalation, and disruption of services. This can compromise sensitive data confidentiality and integrity, and cause availability outages. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on Node.js ecosystems and JavaScript DOM emulation are particularly vulnerable. The shared process execution model increases the attack surface, making containment difficult. Given the high CVSS score and critical severity, failure to patch could lead to severe operational and reputational damage, regulatory non-compliance under GDPR, and potential legal liabilities.

Mitigation Recommendations

European organizations should immediately upgrade all instances of happy-dom to version 20.0.2 or later, where the vulnerability is fixed. Additionally, they should audit their use of untrusted JavaScript execution within the same process or isolate to ensure proper sandboxing. Employ strict input validation and content security policies to limit injection of malicious scripts. Consider architectural changes to separate untrusted code execution into distinct processes or containers to prevent prototype pollution from affecting the main application. Implement runtime monitoring and anomaly detection to identify suspicious prototype modifications or unusual process behavior. Regularly review dependency versions and subscribe to security advisories for timely patching. Finally, conduct security testing focused on prototype pollution and code injection vectors in development and staging environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-13T16:26:12.178Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68efdcb86817339dcf78279f

Added to database: 10/15/2025, 5:41:12 PM

Last enriched: 10/15/2025, 5:49:10 PM

Last updated: 10/15/2025, 7:35:33 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats