CVE-2025-57319
JavaScript vulnerability analysis and mitigation

Overview

A Prototype Pollution vulnerability was discovered in the fast-redact package (CVE-2025-57319), affecting version 3.5.0 and earlier. The vulnerability was disclosed on September 24, 2025, and is located in the nestedRestore function. Fast-redact is a package designed to provide fast object redaction capabilities. Notably, this vulnerability is currently disputed by the supplier (NVD).

Technical details

The vulnerability exists in the nestedRestore function of fast-redact, where attackers can potentially inject properties on Object.prototype through a crafted payload. The CVSS v3.1 base score has been rated as 7.5 (HIGH) by CISA-ADP, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. However, Red Hat has assessed it with a lower CVSS score of 4.2, using the vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L (Red Hat).

Impact

The primary impact of this vulnerability is the potential for denial of service (DoS) attacks, which is considered the minimum consequence of successful exploitation. The supplier disputes the severity, stating that the reporter only demonstrated access to properties through an internal utility function, with no means of achieving prototype pollution via the public API (NVD).

Mitigation and workarounds

Currently, mitigation options are limited. According to Red Hat's assessment, mitigation for this issue is either not available or the currently available options do not meet their Product Security criteria for ease of use, deployment, applicability to widespread installation base, or stability (Red Hat).

Community reactions

The vulnerability has generated discussion within the security community, particularly due to the dispute between the initial report and the supplier's response. An issue has been opened on the fast-redact GitHub repository to address the vulnerability, indicating active engagement from the development community (Github Issue).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59837HIGH7.2
  • JavaScriptJavaScript
  • astro
NoYesOct 28, 2025
CVE-2025-62713HIGH7.2
  • JavaScriptJavaScript
  • @kottster/server
NoYesOct 23, 2025
GHSA-5jpx-9hw9-2fx4MEDIUM6.9
  • JavaScriptJavaScript
  • next-auth
NoYesOct 29, 2025
GHSA-q7jf-gf43-6x6pMEDIUM6.5
  • JavaScriptJavaScript
  • hono
NoYesOct 24, 2025
CVE-2025-62517MEDIUM5.9
  • JavaScriptJavaScript
  • rollbar
NoYesOct 23, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management