Skip to content

Commit 7505457

Browse files
1 parent 6927abe commit 7505457

File tree

3 files changed

+94
-44
lines changed

3 files changed

+94
-44
lines changed
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3jp5-5f8r-q2wg",
4+
"modified": "2025-12-12T22:14:53Z",
5+
"published": "2025-12-12T21:31:38Z",
6+
"aliases": [
7+
"CVE-2025-8083"
8+
],
9+
"summary": "Vuetify has a Prototype Pollution vulnerability",
10+
"details": "The Preset configuration feature of Vuetify is vulnerable to Prototype Pollution due to the internal 'mergeDeep' utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application's behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data.\n\nIf the application utilizes Server-Side Rendering (SSR), this vulnerability could affect the whole server process.\n\nThis issue affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "vuetify"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "2.2.0-beta.2"
29+
},
30+
{
31+
"fixed": "3.0.0-alpha.10"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8083"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://codepen.io/herodevs/pen/RNWoaQM/f1f4ccc7e6a307c2a8c36d948ba14755"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/vuetifyjs/vuetify"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://www.herodevs.com/vulnerability-directory/cve-2025-8083"
54+
}
55+
],
56+
"database_specific": {
57+
"cwe_ids": [
58+
"CWE-1321"
59+
],
60+
"severity": "HIGH",
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-12-12T22:14:53Z",
63+
"nvd_published_at": "2025-12-12T20:15:43Z"
64+
}
65+
}

advisories/unreviewed/2025/12/GHSA-9w3x-85mw-4fwm/GHSA-9w3x-85mw-4fwm.json renamed to advisories/github-reviewed/2025/12/GHSA-9w3x-85mw-4fwm/GHSA-9w3x-85mw-4fwm.json

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9w3x-85mw-4fwm",
4-
"modified": "2025-12-12T21:31:38Z",
4+
"modified": "2025-12-12T22:13:54Z",
55
"published": "2025-12-12T21:31:38Z",
66
"aliases": [
77
"CVE-2025-8082"
88
],
9+
"summary": "Vuetify has a Cross-site Scripting (XSS) vulnerability in the VDatePicker component",
910
"details": "Improper neutralization of the title date in the 'VDatePicker' component in Vuetify, allows unsanitized HTML to be inserted into the page. This can lead to a Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the 'title-date-format' property of the 'VDatePicker' can accept a user created function and assign its output to the 'innerHTML' property of the title element without sanitization.\n\nThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here https://v2.vuetifyjs.com/en/about/eol/ .",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "vuetify"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "2.0.0"
29+
},
30+
{
31+
"fixed": "3.0.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -23,6 +44,10 @@
2344
"type": "WEB",
2445
"url": "https://codepen.io/herodevs/pen/dPYGPyR/775285c0fd5a08038d4c85398815d644"
2546
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/vuetifyjs/vuetify"
50+
},
2651
{
2752
"type": "WEB",
2853
"url": "https://www.herodevs.com/vulnerability-directory/cve-2025-8082"
@@ -33,8 +58,8 @@
3358
"CWE-79"
3459
],
3560
"severity": "MODERATE",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
61+
"github_reviewed": true,
62+
"github_reviewed_at": "2025-12-12T22:13:54Z",
3863
"nvd_published_at": "2025-12-12T19:16:04Z"
3964
}
4065
}

advisories/unreviewed/2025/12/GHSA-3jp5-5f8r-q2wg/GHSA-3jp5-5f8r-q2wg.json

Lines changed: 0 additions & 40 deletions
This file was deleted.

0 commit comments

Comments
 (0)