Vue I18n is the internationalization plugin for Vue.js. @intlify/message-resolver and @intlify/vue-i18n-core are vulnerable to Prototype Pollution through the entry function: handleFlatJson. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence. Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Mar 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 07 Mar 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vue I18n is the internationalization plugin for Vue.js. @intlify/message-resolver and @intlify/vue-i18n-core are vulnerable to Prototype Pollution through the entry function: handleFlatJson. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence. Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context. | |
Title | Vue I18n Prototype Pollution in `handleFlatJson` | |
Weaknesses | CWE-1321 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-07T15:51:39.753Z
Updated: 2025-03-07T18:00:10.289Z
Reserved: 2025-03-03T15:10:34.078Z
Link: CVE-2025-27597

Updated: 2025-03-07T17:59:40.683Z

Status : Received
Published: 2025-03-07T16:15:39.893
Modified: 2025-03-07T18:15:48.163
Link: CVE-2025-27597

No data.