Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31052 | fast-redact vulnerable to prototype pollution |
Github GHSA |
GHSA-ffrw-9mx8-89p8 | Withdrawn Advisory: fast-redact vulnerable to prototype pollution |
Sat, 27 Sep 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | fast-redact: fast-redact prototype pollution | |
| Weaknesses | CWE-1321 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 26 Sep 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | fast-redact is a package that provides do very fast object redaction. A Prototype Pollution vulnerability in the nestedRestore function of fast-redact version 3.5.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence. | fast-redact is a package that provides do very fast object redaction. A Prototype Pollution vulnerability in the nestedRestore function of fast-redact version 3.5.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence. NOTE: the Supplier disputes this because the reporter only demonstrated access to properties by an internal utility function, and there is no means for achieving prototype pollution via the public API. |
| References |
| |
| Metrics |
cvssV3_1
|
Wed, 24 Sep 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | fast-redact is a package that provides do very fast object redaction. A Prototype Pollution vulnerability in the nestedRestore function of fast-redact version 3.5.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-26T17:10:52.557Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57319
Updated: 2025-09-26T16:56:05.010Z
Status : Deferred
Published: 2025-09-24T21:15:32.083
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-57319
OpenCVE Enrichment
No data.
EUVD
Github GHSA