Radashi is a TypeScript utility toolkit. Prior to version 12.5.1, the set function within the Radashi library is vulnerable to prototype pollution. If an attacker can control parts of the path argument to the set function, they could potentially modify the prototype of all objects in the JavaScript runtime, leading to unexpected behavior, denial of service, or even remote code execution in some specific scenarios. This issue has been patched in version 12.5.1. A workaround for this issue involves sanitizing the path argument provided to the set function to ensure that no part of the path string is __proto__, prototype, or constructor.
History

Wed, 28 May 2025 17:15:00 +0000

Type Values Removed Values Added
References

Tue, 27 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 May 2025 15:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 27 May 2025 04:30:00 +0000

Type Values Removed Values Added
Description Radashi is a TypeScript utility toolkit. Prior to version 12.5.1, the set function within the Radashi library is vulnerable to prototype pollution. If an attacker can control parts of the path argument to the set function, they could potentially modify the prototype of all objects in the JavaScript runtime, leading to unexpected behavior, denial of service, or even remote code execution in some specific scenarios. This issue has been patched in version 12.5.1. A workaround for this issue involves sanitizing the path argument provided to the set function to ensure that no part of the path string is __proto__, prototype, or constructor.
Title Radashi Vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Weaknesses CWE-1321
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-05-27T04:04:13.029Z

Updated: 2025-05-27T20:01:01.623Z

Reserved: 2025-05-15T16:06:40.940Z

Link: CVE-2025-48054

cve-icon Vulnrichment

Updated: 2025-05-27T20:00:58.114Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-27T05:15:23.990

Modified: 2025-05-28T15:01:30.720

Link: CVE-2025-48054

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-05-27T04:04:13Z

Links: CVE-2025-48054 - Bugzilla