CVE-2025-54803
JavaScript vulnerability analysis and mitigation

Overview

CVE-2025-54803 affects js-toml, a TOML parser for JavaScript that is fully compliant with the TOML 1.0.0 Spec. The vulnerability was discovered in versions below 1.0.2 and was disclosed on August 3, 2025. The issue is a prototype pollution vulnerability that allows remote attackers to add or modify properties of the global Object.prototype by parsing maliciously crafted TOML input (GitHub Advisory).

Technical details

The vulnerability is classified as CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes). The issue received a CVSS v4.0 base score of 7.9 (High), with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H. The vulnerability exists in the way js-toml handles object creation and property assignment when parsing TOML input, specifically when processing specially crafted keys like proto (NVD).

Impact

While the js-toml library itself does not contain known vulnerable gadgets, this vulnerability can lead to severe security issues in applications using the library. The potential impacts include authentication bypass (if applications check for properties like user.isAdmin), Denial of Service (DoS), and in some cases, Remote Code Execution (RCE), depending on the application's logic and dependencies. Any application using an affected version of js-toml to parse untrusted input is vulnerable (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 1.0.2 of js-toml. Users are strongly advised to upgrade to this version or later. If immediate upgrading is not possible, the only workaround is to ensure that any TOML input being parsed by js-toml comes from fully trusted sources and has been validated to not contain malicious keys (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67731HIGH8.7
  • JavaScriptJavaScript
  • servify-express
NoYesDec 12, 2025
CVE-2025-67718HIGH8.7
  • JavaScriptJavaScript
  • formio
NoYesDec 11, 2025
CVE-2025-8083HIGH8.6
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025
CVE-2025-67750HIGH8.4
  • JavaScriptJavaScript
  • lightning-flow-scanner
NoYesDec 12, 2025
CVE-2025-8082MEDIUM6.3
  • JavaScriptJavaScript
  • vuetify
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management