CVE-2025-8083

8.6 HIGH

📋 TL;DR

This CVE describes a prototype pollution vulnerability in Vuetify's preset configuration feature. Attackers can inject malicious properties into JavaScript objects, potentially causing denial of service, unauthorized data access, or complete server compromise in SSR deployments. All applications using Vuetify 2.2.0-beta.2 through 3.0.0-alpha.10 are affected.

💻 Affected Systems

Products:
  • Vuetify
Versions: >=2.2.0-beta.2, <3.0.0-alpha.10
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vuetify 2.x is end-of-life and won't receive official patches. SSR deployments are particularly vulnerable as they affect the entire server process.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise in SSR deployments leading to remote code execution, data exfiltration, or persistent backdoor installation.

🟠

Likely Case

Application instability, denial of service, or unauthorized access to sensitive data through polluted object prototypes.

🟢

If Mitigated

Limited impact if input validation prevents malicious preset injection, though underlying vulnerability remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept demonstrates exploitation. Attack requires ability to inject malicious preset configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://v2.vuetifyjs.com/en/about/eol/

Restart Required: Yes

Instructions:

1. Upgrade to Vuetify 3.x (not vulnerable). 2. Note: Vuetify 2.x is end-of-life with no official patches. 3. Restart all affected applications after migration.

🔧 Temporary Workarounds

Input Validation for Presets

all

Implement strict validation and sanitization of all preset configuration inputs before processing.

Disable Preset Feature

all

Remove or disable the vulnerable preset configuration feature if not required.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all preset configuration data
  • Deploy web application firewall (WAF) rules to detect and block prototype pollution attempts

🔍 How to Verify

Check if Vulnerable:

Check package.json for Vuetify version between 2.2.0-beta.2 and 3.0.0-alpha.10

Check Version:

npm list vuetify | grep vuetify

Verify Fix Applied:

Confirm Vuetify version is 3.0.0-alpha.10 or higher, or application no longer uses vulnerable preset feature

📡 Detection & Monitoring

Log Indicators:

  • Unusual preset configuration patterns
  • Application crashes or instability after preset changes
  • Unexpected property assignments in JavaScript objects

Network Indicators:

  • HTTP requests with malformed preset configuration payloads
  • Unusual patterns in preset API calls

SIEM Query:

source="application_logs" AND ("preset" OR "mergeDeep") AND (error OR crash OR exception)

🔗 References

📤 Share & Export