{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-8083","assignerOrgId":"36c7be3b-2937-45df-85ea-ca7133ea542c","state":"PUBLISHED","assignerShortName":"HeroDevs","dateReserved":"2025-07-23T13:08:31.769Z","datePublished":"2025-12-12T19:29:06.926Z","dateUpdated":"2025-12-12T19:39:20.731Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://registry.npmjs.org","defaultStatus":"unaffected","packageName":"vuetify","product":"Vuetify","repo":"https://github.com/vuetifyjs/vuetify","vendor":"N/A","versions":[{"status":"affected","version":">=2.2.0-beta.2 <3.0.0-alpha.10","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Christiaan Swiers"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: transparent;\"><span style=\"background-color: transparent;\"><span style=\"background-color: transparent;\"><span style=\"background-color: transparent;\"><span style=\"background-color: transparent;\">T</span>he <a target=\"_blank\" rel=\"nofollow\" href=\"https://v2.vuetifyjs.com/en/features/presets\">Preset configuration</a>&nbsp;feature of Vuetify is vulnerable to <a target=\"_blank\" rel=\"nofollow\" href=\"https://cheatsheetseries.owasp.org/cheatsheets/Prototype_Pollution_Prevention_Cheat_Sheet.html\">Prototype Pollution</a>&nbsp;due to t</span>he internal '<tt>mergeDeep</tt>' utility function used to merge options with defaults.</span></span><span style=\"background-color: transparent;\"><span style=\"background-color: transparent;\">&nbsp;</span><span style=\"background-color: transparent;\">Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application's behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data.</span></span><br><br>If the application utilizes&nbsp;Server-Side Rendering (SSR), this vulnerability could affect the whole server process.<br></span><br>This issue affects Vuetify versions greater than or equal to 2.2.0-beta.2&nbsp;and less than <span style=\"background-color: rgb(255, 255, 255);\">3.0.0-alpha.10</span>.<br><br><b>Note:</b><br>Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see <a target=\"_blank\" rel=\"nofollow\" href=\"https://v2.vuetifyjs.com/en/about/eol/\">here</a>.<br>"}],"value":"The  Preset configuration https://v2.vuetifyjs.com/en/features/presets  feature of Vuetify is vulnerable to  Prototype Pollution https://cheatsheetseries.owasp.org/cheatsheets/Prototype_Pollution_Prevention_Cheat_Sheet.html  due to the internal 'mergeDeep' utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application's behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data.\n\nIf the application utilizes Server-Side Rendering (SSR), this vulnerability could affect the whole server process.\n\nThis issue affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see  here https://v2.vuetifyjs.com/en/about/eol/ ."}],"impacts":[{"capecId":"CAPEC-77","descriptions":[{"lang":"en","value":"CAPEC-77 Manipulating User-Controlled Variables"}]},{"capecId":"CAPEC-130","descriptions":[{"lang":"en","value":"CAPEC-130 Excessive Allocation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1321","description":"CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"36c7be3b-2937-45df-85ea-ca7133ea542c","shortName":"HeroDevs","dateUpdated":"2025-12-12T19:29:06.926Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.herodevs.com/vulnerability-directory/cve-2025-8083"},{"tags":["technical-description","exploit"],"url":"https://codepen.io/herodevs/pen/RNWoaQM/f1f4ccc7e6a307c2a8c36d948ba14755"}],"source":{"discovery":"UNKNOWN"},"tags":["unsupported-when-assigned","x_open-source"],"title":"Vuetify Prototype Pollution via Preset options","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-12T19:38:59.651424Z","id":"CVE-2025-8083","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-12T19:39:20.731Z"}}]}}