fkie_cve-2025-55195
Vulnerability from fkie_nvd
Published
2025-08-14 17:15
Modified
2025-08-15 13:12
Severity ?
Summary
@std/toml is the Deno Standard Library. Prior to version 1.0.9, an attacker can pollute the prototype chain in Node.js runtime and Browser when parsing untrusted TOML data, thus achieving Prototype Pollution (PP) vulnerability. This is because the library is merging an untrusted object with an empty object, which by default the empty object has the prototype chain. This issue has been patched in version 1.0.9.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "@std/toml is the Deno Standard Library. Prior to version 1.0.9, an attacker can pollute the prototype chain in Node.js runtime and Browser when parsing untrusted TOML data, thus achieving Prototype Pollution (PP) vulnerability. This is because the library is merging an untrusted object with an empty object, which by default the empty object has the prototype chain. This issue has been patched in version 1.0.9." }, { "lang": "es", "value": "@std/toml es la librer\u00eda est\u00e1ndar de Deno. Antes de la versi\u00f3n 1.0.9, un atacante pod\u00eda contaminar la cadena de prototipos en el entorno de ejecuci\u00f3n y el navegador de Node.js al analizar datos TOML no confiables, lo que provocaba una vulnerabilidad de contaminaci\u00f3n de prototipos (PP). Esto se debe a que la librer\u00eda fusiona un objeto no confiable con un objeto vac\u00edo, que por defecto contiene la cadena de prototipos. Este problema se ha corregido en la versi\u00f3n 1.0.9." } ], "id": "CVE-2025-55195", "lastModified": "2025-08-15T13:12:51.217", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-08-14T17:15:41.330", "references": [ { "source": "security-advisories@github.com", "url": "https://github.com/denoland/std/commit/540662cfd6d71e969af292aa604ef4049dbe271b" }, { "source": "security-advisories@github.com", "url": "https://github.com/denoland/std/releases/tag/release-2025.08.13" }, { "source": "security-advisories@github.com", "url": "https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "url": "https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1321" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…