{"uuid": "da45e997-b763-4aa0-85d2-72f1a2cd5668", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27597", "type": "seen", "source": "https://t.me/cvedetector/19832", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27597 - Vue I18n Prototype Pollution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27597 \nPublished : March 7, 2025, 4:15 p.m. | 58\u00a0minutes ago \nDescription : Vue I18n is the internationalization plugin for Vue.js. @intlify/message-resolver and @intlify/vue-i18n-core are vulnerable to Prototype Pollution through the entry function: handleFlatJson. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) a the minimum consequence. Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-07T18:17:19.000000Z"}